2021-09-16 12:01:14 -04:00
|
|
|
|
# Copyright 2018-2021 The Matrix.org Foundation C.I.C.
|
2020-01-09 08:31:00 -05:00
|
|
|
|
#
|
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
|
#
|
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
#
|
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
|
# limitations under the License.
|
|
|
|
|
|
|
|
|
|
import hashlib
|
|
|
|
|
import hmac
|
2021-08-11 15:29:59 -04:00
|
|
|
|
import os
|
2020-02-28 04:58:05 -05:00
|
|
|
|
import urllib.parse
|
2020-10-27 10:12:31 -04:00
|
|
|
|
from binascii import unhexlify
|
2021-11-30 04:53:54 -05:00
|
|
|
|
from http import HTTPStatus
|
2021-02-22 14:38:51 -05:00
|
|
|
|
from typing import List, Optional
|
2021-04-27 08:13:07 -04:00
|
|
|
|
from unittest.mock import Mock, patch
|
2020-01-09 08:31:00 -05:00
|
|
|
|
|
2021-10-12 15:38:48 -04:00
|
|
|
|
from parameterized import parameterized, parameterized_class
|
2021-08-11 15:29:59 -04:00
|
|
|
|
|
2020-01-09 08:31:00 -05:00
|
|
|
|
import synapse.rest.admin
|
|
|
|
|
from synapse.api.constants import UserTypes
|
2020-09-18 10:26:36 -04:00
|
|
|
|
from synapse.api.errors import Codes, HttpResponseException, ResourceLimitError
|
2021-01-11 14:32:17 -05:00
|
|
|
|
from synapse.api.room_versions import RoomVersions
|
2021-08-17 07:57:58 -04:00
|
|
|
|
from synapse.rest.client import devices, login, logout, profile, room, sync
|
2021-08-11 15:29:59 -04:00
|
|
|
|
from synapse.rest.media.v1.filepath import MediaFilePaths
|
2021-04-01 06:28:53 -04:00
|
|
|
|
from synapse.types import JsonDict, UserID
|
2020-01-09 08:31:00 -05:00
|
|
|
|
|
|
|
|
|
from tests import unittest
|
2021-02-22 14:38:51 -05:00
|
|
|
|
from tests.server import FakeSite, make_request
|
2021-09-16 12:01:14 -04:00
|
|
|
|
from tests.test_utils import SMALL_PNG, make_awaitable
|
2020-06-05 08:08:49 -04:00
|
|
|
|
from tests.unittest import override_config
|
2020-01-09 08:31:00 -05:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
class UserRegisterTestCase(unittest.HomeserverTestCase):
|
|
|
|
|
|
2020-11-05 08:55:45 -05:00
|
|
|
|
servlets = [
|
|
|
|
|
synapse.rest.admin.register_servlets_for_client_rest_resource,
|
|
|
|
|
profile.register_servlets,
|
|
|
|
|
]
|
2020-01-09 08:31:00 -05:00
|
|
|
|
|
|
|
|
|
def make_homeserver(self, reactor, clock):
|
|
|
|
|
|
2020-11-25 16:26:11 -05:00
|
|
|
|
self.url = "/_synapse/admin/v1/register"
|
2020-01-09 08:31:00 -05:00
|
|
|
|
|
|
|
|
|
self.registration_handler = Mock()
|
|
|
|
|
self.identity_handler = Mock()
|
|
|
|
|
self.login_handler = Mock()
|
|
|
|
|
self.device_handler = Mock()
|
|
|
|
|
self.device_handler.check_device_registered = Mock(return_value="FAKE")
|
|
|
|
|
|
|
|
|
|
self.datastore = Mock(return_value=Mock())
|
|
|
|
|
self.datastore.get_current_state_deltas = Mock(return_value=(0, []))
|
|
|
|
|
|
|
|
|
|
self.hs = self.setup_test_homeserver()
|
|
|
|
|
|
2021-10-04 07:18:54 -04:00
|
|
|
|
self.hs.config.registration.registration_shared_secret = "shared"
|
2020-01-09 08:31:00 -05:00
|
|
|
|
|
|
|
|
|
self.hs.get_media_repository = Mock()
|
|
|
|
|
self.hs.get_deactivate_account_handler = Mock()
|
|
|
|
|
|
|
|
|
|
return self.hs
|
|
|
|
|
|
|
|
|
|
def test_disabled(self):
|
|
|
|
|
"""
|
|
|
|
|
If there is no shared secret, registration through this method will be
|
|
|
|
|
prevented.
|
|
|
|
|
"""
|
2021-10-04 07:18:54 -04:00
|
|
|
|
self.hs.config.registration.registration_shared_secret = None
|
2020-01-09 08:31:00 -05:00
|
|
|
|
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request("POST", self.url, b"{}")
|
2020-01-09 08:31:00 -05:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2020-01-09 08:31:00 -05:00
|
|
|
|
self.assertEqual(
|
|
|
|
|
"Shared secret registration is not enabled", channel.json_body["error"]
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
def test_get_nonce(self):
|
|
|
|
|
"""
|
|
|
|
|
Calling GET on the endpoint will return a randomised nonce, using the
|
|
|
|
|
homeserver's secrets provider.
|
|
|
|
|
"""
|
2021-04-27 08:13:07 -04:00
|
|
|
|
with patch("secrets.token_hex") as token_hex:
|
|
|
|
|
# Patch secrets.token_hex for the duration of this context
|
|
|
|
|
token_hex.return_value = "abcd"
|
2020-01-09 08:31:00 -05:00
|
|
|
|
|
2021-04-27 08:13:07 -04:00
|
|
|
|
channel = self.make_request("GET", self.url)
|
2020-01-09 08:31:00 -05:00
|
|
|
|
|
2021-04-27 08:13:07 -04:00
|
|
|
|
self.assertEqual(channel.json_body, {"nonce": "abcd"})
|
2020-01-09 08:31:00 -05:00
|
|
|
|
|
|
|
|
|
def test_expired_nonce(self):
|
|
|
|
|
"""
|
|
|
|
|
Calling GET on the endpoint will return a randomised nonce, which will
|
|
|
|
|
only last for SALT_TIMEOUT (60s).
|
|
|
|
|
"""
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request("GET", self.url)
|
2020-01-09 08:31:00 -05:00
|
|
|
|
nonce = channel.json_body["nonce"]
|
|
|
|
|
|
|
|
|
|
# 59 seconds
|
|
|
|
|
self.reactor.advance(59)
|
|
|
|
|
|
2021-10-12 15:38:48 -04:00
|
|
|
|
body = {"nonce": nonce}
|
|
|
|
|
channel = self.make_request("POST", self.url, body)
|
2020-01-09 08:31:00 -05:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2020-01-09 08:31:00 -05:00
|
|
|
|
self.assertEqual("username must be specified", channel.json_body["error"])
|
|
|
|
|
|
|
|
|
|
# 61 seconds
|
|
|
|
|
self.reactor.advance(2)
|
|
|
|
|
|
2021-10-12 15:38:48 -04:00
|
|
|
|
channel = self.make_request("POST", self.url, body)
|
2020-01-09 08:31:00 -05:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2020-01-09 08:31:00 -05:00
|
|
|
|
self.assertEqual("unrecognised nonce", channel.json_body["error"])
|
|
|
|
|
|
|
|
|
|
def test_register_incorrect_nonce(self):
|
|
|
|
|
"""
|
|
|
|
|
Only the provided nonce can be used, as it's checked in the MAC.
|
|
|
|
|
"""
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request("GET", self.url)
|
2020-01-09 08:31:00 -05:00
|
|
|
|
nonce = channel.json_body["nonce"]
|
|
|
|
|
|
|
|
|
|
want_mac = hmac.new(key=b"shared", digestmod=hashlib.sha1)
|
|
|
|
|
want_mac.update(b"notthenonce\x00bob\x00abc123\x00admin")
|
2021-12-03 08:57:13 -05:00
|
|
|
|
want_mac_str = want_mac.hexdigest()
|
2020-01-09 08:31:00 -05:00
|
|
|
|
|
2021-10-12 15:38:48 -04:00
|
|
|
|
body = {
|
|
|
|
|
"nonce": nonce,
|
|
|
|
|
"username": "bob",
|
|
|
|
|
"password": "abc123",
|
|
|
|
|
"admin": True,
|
2021-12-03 08:57:13 -05:00
|
|
|
|
"mac": want_mac_str,
|
2021-10-12 15:38:48 -04:00
|
|
|
|
}
|
|
|
|
|
channel = self.make_request("POST", self.url, body)
|
2020-01-09 08:31:00 -05:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.FORBIDDEN, channel.code, msg=channel.json_body)
|
2020-01-09 08:31:00 -05:00
|
|
|
|
self.assertEqual("HMAC incorrect", channel.json_body["error"])
|
|
|
|
|
|
|
|
|
|
def test_register_correct_nonce(self):
|
|
|
|
|
"""
|
|
|
|
|
When the correct nonce is provided, and the right key is provided, the
|
|
|
|
|
user is registered.
|
|
|
|
|
"""
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request("GET", self.url)
|
2020-01-09 08:31:00 -05:00
|
|
|
|
nonce = channel.json_body["nonce"]
|
|
|
|
|
|
|
|
|
|
want_mac = hmac.new(key=b"shared", digestmod=hashlib.sha1)
|
|
|
|
|
want_mac.update(
|
|
|
|
|
nonce.encode("ascii") + b"\x00bob\x00abc123\x00admin\x00support"
|
|
|
|
|
)
|
2021-12-03 08:57:13 -05:00
|
|
|
|
want_mac_str = want_mac.hexdigest()
|
2020-01-09 08:31:00 -05:00
|
|
|
|
|
2021-10-12 15:38:48 -04:00
|
|
|
|
body = {
|
|
|
|
|
"nonce": nonce,
|
|
|
|
|
"username": "bob",
|
|
|
|
|
"password": "abc123",
|
|
|
|
|
"admin": True,
|
|
|
|
|
"user_type": UserTypes.SUPPORT,
|
2021-12-03 08:57:13 -05:00
|
|
|
|
"mac": want_mac_str,
|
2021-10-12 15:38:48 -04:00
|
|
|
|
}
|
|
|
|
|
channel = self.make_request("POST", self.url, body)
|
2020-01-09 08:31:00 -05:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-01-09 08:31:00 -05:00
|
|
|
|
self.assertEqual("@bob:test", channel.json_body["user_id"])
|
|
|
|
|
|
|
|
|
|
def test_nonce_reuse(self):
|
|
|
|
|
"""
|
|
|
|
|
A valid unrecognised nonce.
|
|
|
|
|
"""
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request("GET", self.url)
|
2020-01-09 08:31:00 -05:00
|
|
|
|
nonce = channel.json_body["nonce"]
|
|
|
|
|
|
|
|
|
|
want_mac = hmac.new(key=b"shared", digestmod=hashlib.sha1)
|
|
|
|
|
want_mac.update(nonce.encode("ascii") + b"\x00bob\x00abc123\x00admin")
|
2021-12-03 08:57:13 -05:00
|
|
|
|
want_mac_str = want_mac.hexdigest()
|
2020-01-09 08:31:00 -05:00
|
|
|
|
|
2021-10-12 15:38:48 -04:00
|
|
|
|
body = {
|
|
|
|
|
"nonce": nonce,
|
|
|
|
|
"username": "bob",
|
|
|
|
|
"password": "abc123",
|
|
|
|
|
"admin": True,
|
2021-12-03 08:57:13 -05:00
|
|
|
|
"mac": want_mac_str,
|
2021-10-12 15:38:48 -04:00
|
|
|
|
}
|
|
|
|
|
channel = self.make_request("POST", self.url, body)
|
2020-01-09 08:31:00 -05:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-01-09 08:31:00 -05:00
|
|
|
|
self.assertEqual("@bob:test", channel.json_body["user_id"])
|
|
|
|
|
|
|
|
|
|
# Now, try and reuse it
|
2021-10-12 15:38:48 -04:00
|
|
|
|
channel = self.make_request("POST", self.url, body)
|
2020-01-09 08:31:00 -05:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2020-01-09 08:31:00 -05:00
|
|
|
|
self.assertEqual("unrecognised nonce", channel.json_body["error"])
|
|
|
|
|
|
|
|
|
|
def test_missing_parts(self):
|
|
|
|
|
"""
|
|
|
|
|
Synapse will complain if you don't give nonce, username, password, and
|
|
|
|
|
mac. Admin and user_types are optional. Additional checks are done for length
|
|
|
|
|
and type.
|
|
|
|
|
"""
|
|
|
|
|
|
|
|
|
|
def nonce():
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request("GET", self.url)
|
2020-01-09 08:31:00 -05:00
|
|
|
|
return channel.json_body["nonce"]
|
|
|
|
|
|
|
|
|
|
#
|
|
|
|
|
# Nonce check
|
|
|
|
|
#
|
|
|
|
|
|
2021-10-12 15:38:48 -04:00
|
|
|
|
# Must be an empty body present
|
|
|
|
|
channel = self.make_request("POST", self.url, {})
|
2020-01-09 08:31:00 -05:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2020-01-09 08:31:00 -05:00
|
|
|
|
self.assertEqual("nonce must be specified", channel.json_body["error"])
|
|
|
|
|
|
|
|
|
|
#
|
|
|
|
|
# Username checks
|
|
|
|
|
#
|
|
|
|
|
|
|
|
|
|
# Must be present
|
2021-10-12 15:38:48 -04:00
|
|
|
|
channel = self.make_request("POST", self.url, {"nonce": nonce()})
|
2020-01-09 08:31:00 -05:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2020-01-09 08:31:00 -05:00
|
|
|
|
self.assertEqual("username must be specified", channel.json_body["error"])
|
|
|
|
|
|
|
|
|
|
# Must be a string
|
2021-10-12 15:38:48 -04:00
|
|
|
|
body = {"nonce": nonce(), "username": 1234}
|
|
|
|
|
channel = self.make_request("POST", self.url, body)
|
2020-01-09 08:31:00 -05:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2020-01-09 08:31:00 -05:00
|
|
|
|
self.assertEqual("Invalid username", channel.json_body["error"])
|
|
|
|
|
|
|
|
|
|
# Must not have null bytes
|
2021-10-12 15:38:48 -04:00
|
|
|
|
body = {"nonce": nonce(), "username": "abcd\u0000"}
|
|
|
|
|
channel = self.make_request("POST", self.url, body)
|
2020-01-09 08:31:00 -05:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2020-01-09 08:31:00 -05:00
|
|
|
|
self.assertEqual("Invalid username", channel.json_body["error"])
|
|
|
|
|
|
|
|
|
|
# Must not have null bytes
|
2021-10-12 15:38:48 -04:00
|
|
|
|
body = {"nonce": nonce(), "username": "a" * 1000}
|
|
|
|
|
channel = self.make_request("POST", self.url, body)
|
2020-01-09 08:31:00 -05:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2020-01-09 08:31:00 -05:00
|
|
|
|
self.assertEqual("Invalid username", channel.json_body["error"])
|
|
|
|
|
|
|
|
|
|
#
|
|
|
|
|
# Password checks
|
|
|
|
|
#
|
|
|
|
|
|
|
|
|
|
# Must be present
|
2021-10-12 15:38:48 -04:00
|
|
|
|
body = {"nonce": nonce(), "username": "a"}
|
|
|
|
|
channel = self.make_request("POST", self.url, body)
|
2020-01-09 08:31:00 -05:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2020-01-09 08:31:00 -05:00
|
|
|
|
self.assertEqual("password must be specified", channel.json_body["error"])
|
|
|
|
|
|
|
|
|
|
# Must be a string
|
2021-10-12 15:38:48 -04:00
|
|
|
|
body = {"nonce": nonce(), "username": "a", "password": 1234}
|
|
|
|
|
channel = self.make_request("POST", self.url, body)
|
2020-01-09 08:31:00 -05:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2020-01-09 08:31:00 -05:00
|
|
|
|
self.assertEqual("Invalid password", channel.json_body["error"])
|
|
|
|
|
|
|
|
|
|
# Must not have null bytes
|
2021-10-12 15:38:48 -04:00
|
|
|
|
body = {"nonce": nonce(), "username": "a", "password": "abcd\u0000"}
|
|
|
|
|
channel = self.make_request("POST", self.url, body)
|
2020-01-09 08:31:00 -05:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2020-01-09 08:31:00 -05:00
|
|
|
|
self.assertEqual("Invalid password", channel.json_body["error"])
|
|
|
|
|
|
|
|
|
|
# Super long
|
2021-10-12 15:38:48 -04:00
|
|
|
|
body = {"nonce": nonce(), "username": "a", "password": "A" * 1000}
|
|
|
|
|
channel = self.make_request("POST", self.url, body)
|
2020-01-09 08:31:00 -05:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2020-01-09 08:31:00 -05:00
|
|
|
|
self.assertEqual("Invalid password", channel.json_body["error"])
|
|
|
|
|
|
|
|
|
|
#
|
|
|
|
|
# user_type check
|
|
|
|
|
#
|
|
|
|
|
|
|
|
|
|
# Invalid user_type
|
2021-10-12 15:38:48 -04:00
|
|
|
|
body = {
|
|
|
|
|
"nonce": nonce(),
|
|
|
|
|
"username": "a",
|
|
|
|
|
"password": "1234",
|
|
|
|
|
"user_type": "invalid",
|
|
|
|
|
}
|
|
|
|
|
channel = self.make_request("POST", self.url, body)
|
2020-01-09 08:31:00 -05:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2020-01-09 08:31:00 -05:00
|
|
|
|
self.assertEqual("Invalid user type", channel.json_body["error"])
|
|
|
|
|
|
2020-11-05 08:55:45 -05:00
|
|
|
|
def test_displayname(self):
|
|
|
|
|
"""
|
|
|
|
|
Test that displayname of new user is set
|
|
|
|
|
"""
|
|
|
|
|
|
|
|
|
|
# set no displayname
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request("GET", self.url)
|
2020-11-05 08:55:45 -05:00
|
|
|
|
nonce = channel.json_body["nonce"]
|
|
|
|
|
|
|
|
|
|
want_mac = hmac.new(key=b"shared", digestmod=hashlib.sha1)
|
|
|
|
|
want_mac.update(nonce.encode("ascii") + b"\x00bob1\x00abc123\x00notadmin")
|
2021-12-03 08:57:13 -05:00
|
|
|
|
want_mac_str = want_mac.hexdigest()
|
2020-11-05 08:55:45 -05:00
|
|
|
|
|
2021-10-12 15:38:48 -04:00
|
|
|
|
body = {
|
|
|
|
|
"nonce": nonce,
|
|
|
|
|
"username": "bob1",
|
|
|
|
|
"password": "abc123",
|
2021-12-03 08:57:13 -05:00
|
|
|
|
"mac": want_mac_str,
|
2021-10-12 15:38:48 -04:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
channel = self.make_request("POST", self.url, body)
|
2020-11-05 08:55:45 -05:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-11-05 08:55:45 -05:00
|
|
|
|
self.assertEqual("@bob1:test", channel.json_body["user_id"])
|
|
|
|
|
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request("GET", "/profile/@bob1:test/displayname")
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-11-05 08:55:45 -05:00
|
|
|
|
self.assertEqual("bob1", channel.json_body["displayname"])
|
|
|
|
|
|
|
|
|
|
# displayname is None
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request("GET", self.url)
|
2020-11-05 08:55:45 -05:00
|
|
|
|
nonce = channel.json_body["nonce"]
|
|
|
|
|
|
|
|
|
|
want_mac = hmac.new(key=b"shared", digestmod=hashlib.sha1)
|
|
|
|
|
want_mac.update(nonce.encode("ascii") + b"\x00bob2\x00abc123\x00notadmin")
|
2021-12-03 08:57:13 -05:00
|
|
|
|
want_mac_str = want_mac.hexdigest()
|
2020-11-05 08:55:45 -05:00
|
|
|
|
|
2021-10-12 15:38:48 -04:00
|
|
|
|
body = {
|
|
|
|
|
"nonce": nonce,
|
|
|
|
|
"username": "bob2",
|
|
|
|
|
"displayname": None,
|
|
|
|
|
"password": "abc123",
|
2021-12-03 08:57:13 -05:00
|
|
|
|
"mac": want_mac_str,
|
2021-10-12 15:38:48 -04:00
|
|
|
|
}
|
|
|
|
|
channel = self.make_request("POST", self.url, body)
|
2020-11-05 08:55:45 -05:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-11-05 08:55:45 -05:00
|
|
|
|
self.assertEqual("@bob2:test", channel.json_body["user_id"])
|
|
|
|
|
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request("GET", "/profile/@bob2:test/displayname")
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-11-05 08:55:45 -05:00
|
|
|
|
self.assertEqual("bob2", channel.json_body["displayname"])
|
|
|
|
|
|
|
|
|
|
# displayname is empty
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request("GET", self.url)
|
2020-11-05 08:55:45 -05:00
|
|
|
|
nonce = channel.json_body["nonce"]
|
|
|
|
|
|
|
|
|
|
want_mac = hmac.new(key=b"shared", digestmod=hashlib.sha1)
|
|
|
|
|
want_mac.update(nonce.encode("ascii") + b"\x00bob3\x00abc123\x00notadmin")
|
2021-12-03 08:57:13 -05:00
|
|
|
|
want_mac_str = want_mac.hexdigest()
|
2020-11-05 08:55:45 -05:00
|
|
|
|
|
2021-10-12 15:38:48 -04:00
|
|
|
|
body = {
|
|
|
|
|
"nonce": nonce,
|
|
|
|
|
"username": "bob3",
|
|
|
|
|
"displayname": "",
|
|
|
|
|
"password": "abc123",
|
2021-12-03 08:57:13 -05:00
|
|
|
|
"mac": want_mac_str,
|
2021-10-12 15:38:48 -04:00
|
|
|
|
}
|
|
|
|
|
channel = self.make_request("POST", self.url, body)
|
2020-11-05 08:55:45 -05:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-11-05 08:55:45 -05:00
|
|
|
|
self.assertEqual("@bob3:test", channel.json_body["user_id"])
|
|
|
|
|
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request("GET", "/profile/@bob3:test/displayname")
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.NOT_FOUND, channel.code, msg=channel.json_body)
|
2020-11-05 08:55:45 -05:00
|
|
|
|
|
|
|
|
|
# set displayname
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request("GET", self.url)
|
2020-11-05 08:55:45 -05:00
|
|
|
|
nonce = channel.json_body["nonce"]
|
|
|
|
|
|
|
|
|
|
want_mac = hmac.new(key=b"shared", digestmod=hashlib.sha1)
|
|
|
|
|
want_mac.update(nonce.encode("ascii") + b"\x00bob4\x00abc123\x00notadmin")
|
2021-12-03 08:57:13 -05:00
|
|
|
|
want_mac_str = want_mac.hexdigest()
|
2020-11-05 08:55:45 -05:00
|
|
|
|
|
2021-10-12 15:38:48 -04:00
|
|
|
|
body = {
|
|
|
|
|
"nonce": nonce,
|
|
|
|
|
"username": "bob4",
|
|
|
|
|
"displayname": "Bob's Name",
|
|
|
|
|
"password": "abc123",
|
2021-12-03 08:57:13 -05:00
|
|
|
|
"mac": want_mac_str,
|
2021-10-12 15:38:48 -04:00
|
|
|
|
}
|
|
|
|
|
channel = self.make_request("POST", self.url, body)
|
2020-11-05 08:55:45 -05:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-11-05 08:55:45 -05:00
|
|
|
|
self.assertEqual("@bob4:test", channel.json_body["user_id"])
|
|
|
|
|
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request("GET", "/profile/@bob4:test/displayname")
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-11-05 08:55:45 -05:00
|
|
|
|
self.assertEqual("Bob's Name", channel.json_body["displayname"])
|
|
|
|
|
|
2020-06-05 08:08:49 -04:00
|
|
|
|
@override_config(
|
|
|
|
|
{"limit_usage_by_mau": True, "max_mau_value": 2, "mau_trial_days": 0}
|
|
|
|
|
)
|
|
|
|
|
def test_register_mau_limit_reached(self):
|
|
|
|
|
"""
|
|
|
|
|
Check we can register a user via the shared secret registration API
|
|
|
|
|
even if the MAU limit is reached.
|
|
|
|
|
"""
|
|
|
|
|
handler = self.hs.get_registration_handler()
|
|
|
|
|
store = self.hs.get_datastore()
|
|
|
|
|
|
|
|
|
|
# Set monthly active users to the limit
|
2020-08-06 08:30:06 -04:00
|
|
|
|
store.get_monthly_active_count = Mock(
|
2021-09-29 06:44:15 -04:00
|
|
|
|
return_value=make_awaitable(self.hs.config.server.max_mau_value)
|
2020-08-06 08:30:06 -04:00
|
|
|
|
)
|
2020-06-05 08:08:49 -04:00
|
|
|
|
# Check that the blocking of monthly active users is working as expected
|
|
|
|
|
# The registration of a new user fails due to the limit
|
|
|
|
|
self.get_failure(
|
|
|
|
|
handler.register_user(localpart="local_part"), ResourceLimitError
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
# Register new user with admin API
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request("GET", self.url)
|
2020-06-05 08:08:49 -04:00
|
|
|
|
nonce = channel.json_body["nonce"]
|
|
|
|
|
|
|
|
|
|
want_mac = hmac.new(key=b"shared", digestmod=hashlib.sha1)
|
|
|
|
|
want_mac.update(
|
|
|
|
|
nonce.encode("ascii") + b"\x00bob\x00abc123\x00admin\x00support"
|
|
|
|
|
)
|
2021-12-03 08:57:13 -05:00
|
|
|
|
want_mac_str = want_mac.hexdigest()
|
2020-06-05 08:08:49 -04:00
|
|
|
|
|
2021-10-12 15:38:48 -04:00
|
|
|
|
body = {
|
|
|
|
|
"nonce": nonce,
|
|
|
|
|
"username": "bob",
|
|
|
|
|
"password": "abc123",
|
|
|
|
|
"admin": True,
|
|
|
|
|
"user_type": UserTypes.SUPPORT,
|
2021-12-03 08:57:13 -05:00
|
|
|
|
"mac": want_mac_str,
|
2021-10-12 15:38:48 -04:00
|
|
|
|
}
|
|
|
|
|
channel = self.make_request("POST", self.url, body)
|
2020-06-05 08:08:49 -04:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-06-05 08:08:49 -04:00
|
|
|
|
self.assertEqual("@bob:test", channel.json_body["user_id"])
|
|
|
|
|
|
2020-01-09 08:31:00 -05:00
|
|
|
|
|
|
|
|
|
class UsersListTestCase(unittest.HomeserverTestCase):
|
|
|
|
|
|
|
|
|
|
servlets = [
|
|
|
|
|
synapse.rest.admin.register_servlets,
|
|
|
|
|
login.register_servlets,
|
|
|
|
|
]
|
|
|
|
|
url = "/_synapse/admin/v2/users"
|
|
|
|
|
|
|
|
|
|
def prepare(self, reactor, clock, hs):
|
2021-04-01 06:28:53 -04:00
|
|
|
|
self.store = hs.get_datastore()
|
|
|
|
|
|
2020-01-09 08:31:00 -05:00
|
|
|
|
self.admin_user = self.register_user("admin", "pass", admin=True)
|
|
|
|
|
self.admin_user_tok = self.login("admin", "pass")
|
|
|
|
|
|
|
|
|
|
def test_no_auth(self):
|
|
|
|
|
"""
|
|
|
|
|
Try to list users without authentication.
|
|
|
|
|
"""
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request("GET", self.url, b"{}")
|
2020-01-09 08:31:00 -05:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.UNAUTHORIZED, channel.code, msg=channel.json_body)
|
2020-12-17 05:43:37 -05:00
|
|
|
|
self.assertEqual(Codes.MISSING_TOKEN, channel.json_body["errcode"])
|
|
|
|
|
|
|
|
|
|
def test_requester_is_no_admin(self):
|
|
|
|
|
"""
|
|
|
|
|
If the user is not a server admin, an error is returned.
|
|
|
|
|
"""
|
2021-01-21 09:18:46 -05:00
|
|
|
|
self._create_users(1)
|
2020-12-17 05:43:37 -05:00
|
|
|
|
other_user_token = self.login("user1", "pass1")
|
|
|
|
|
|
2020-12-17 10:46:40 -05:00
|
|
|
|
channel = self.make_request("GET", self.url, access_token=other_user_token)
|
2020-12-17 05:43:37 -05:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.FORBIDDEN, channel.code, msg=channel.json_body)
|
2020-12-17 05:43:37 -05:00
|
|
|
|
self.assertEqual(Codes.FORBIDDEN, channel.json_body["errcode"])
|
2020-01-09 08:31:00 -05:00
|
|
|
|
|
|
|
|
|
def test_all_users(self):
|
|
|
|
|
"""
|
|
|
|
|
List all users, including deactivated users.
|
|
|
|
|
"""
|
2021-01-21 09:18:46 -05:00
|
|
|
|
self._create_users(2)
|
|
|
|
|
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
2020-01-09 08:31:00 -05:00
|
|
|
|
"GET",
|
|
|
|
|
self.url + "?deactivated=true",
|
2021-07-22 10:05:16 -04:00
|
|
|
|
{},
|
2020-01-09 08:31:00 -05:00
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-01-09 08:31:00 -05:00
|
|
|
|
self.assertEqual(3, len(channel.json_body["users"]))
|
2020-04-28 13:19:36 -04:00
|
|
|
|
self.assertEqual(3, channel.json_body["total"])
|
2020-01-09 08:31:00 -05:00
|
|
|
|
|
2020-12-17 05:43:37 -05:00
|
|
|
|
# Check that all fields are available
|
2021-01-21 09:18:46 -05:00
|
|
|
|
self._check_fields(channel.json_body["users"])
|
2020-12-17 05:43:37 -05:00
|
|
|
|
|
|
|
|
|
def test_search_term(self):
|
|
|
|
|
"""Test that searching for a users works correctly"""
|
|
|
|
|
|
|
|
|
|
def _search_test(
|
|
|
|
|
expected_user_id: Optional[str],
|
|
|
|
|
search_term: str,
|
|
|
|
|
search_field: Optional[str] = "name",
|
2021-11-30 04:53:54 -05:00
|
|
|
|
expected_http_code: Optional[int] = HTTPStatus.OK,
|
2020-12-17 05:43:37 -05:00
|
|
|
|
):
|
|
|
|
|
"""Search for a user and check that the returned user's id is a match
|
|
|
|
|
|
|
|
|
|
Args:
|
|
|
|
|
expected_user_id: The user_id expected to be returned by the API. Set
|
|
|
|
|
to None to expect zero results for the search
|
|
|
|
|
search_term: The term to search for user names with
|
|
|
|
|
search_field: Field which is to request: `name` or `user_id`
|
|
|
|
|
expected_http_code: The expected http code for the request
|
|
|
|
|
"""
|
|
|
|
|
url = self.url + "?%s=%s" % (
|
|
|
|
|
search_field,
|
|
|
|
|
search_term,
|
|
|
|
|
)
|
2020-12-17 10:46:40 -05:00
|
|
|
|
channel = self.make_request(
|
2020-12-17 05:43:37 -05:00
|
|
|
|
"GET",
|
2021-07-22 10:05:16 -04:00
|
|
|
|
url,
|
2020-12-17 05:43:37 -05:00
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
self.assertEqual(expected_http_code, channel.code, msg=channel.json_body)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
if expected_http_code != HTTPStatus.OK:
|
2020-12-17 05:43:37 -05:00
|
|
|
|
return
|
|
|
|
|
|
|
|
|
|
# Check that users were returned
|
|
|
|
|
self.assertTrue("users" in channel.json_body)
|
2021-01-21 09:18:46 -05:00
|
|
|
|
self._check_fields(channel.json_body["users"])
|
2020-12-17 05:43:37 -05:00
|
|
|
|
users = channel.json_body["users"]
|
|
|
|
|
|
|
|
|
|
# Check that the expected number of users were returned
|
|
|
|
|
expected_user_count = 1 if expected_user_id else 0
|
|
|
|
|
self.assertEqual(len(users), expected_user_count)
|
|
|
|
|
self.assertEqual(channel.json_body["total"], expected_user_count)
|
|
|
|
|
|
|
|
|
|
if expected_user_id:
|
|
|
|
|
# Check that the first returned user id is correct
|
|
|
|
|
u = users[0]
|
|
|
|
|
self.assertEqual(expected_user_id, u["name"])
|
|
|
|
|
|
2021-01-21 09:18:46 -05:00
|
|
|
|
self._create_users(2)
|
|
|
|
|
|
|
|
|
|
user1 = "@user1:test"
|
|
|
|
|
user2 = "@user2:test"
|
|
|
|
|
|
2020-12-17 05:43:37 -05:00
|
|
|
|
# Perform search tests
|
2021-01-21 09:18:46 -05:00
|
|
|
|
_search_test(user1, "er1")
|
|
|
|
|
_search_test(user1, "me 1")
|
2020-12-17 05:43:37 -05:00
|
|
|
|
|
2021-01-21 09:18:46 -05:00
|
|
|
|
_search_test(user2, "er2")
|
|
|
|
|
_search_test(user2, "me 2")
|
2020-12-17 05:43:37 -05:00
|
|
|
|
|
2021-01-21 09:18:46 -05:00
|
|
|
|
_search_test(user1, "er1", "user_id")
|
|
|
|
|
_search_test(user2, "er2", "user_id")
|
2020-12-17 05:43:37 -05:00
|
|
|
|
|
|
|
|
|
# Test case insensitive
|
2021-01-21 09:18:46 -05:00
|
|
|
|
_search_test(user1, "ER1")
|
|
|
|
|
_search_test(user1, "NAME 1")
|
2020-12-17 05:43:37 -05:00
|
|
|
|
|
2021-01-21 09:18:46 -05:00
|
|
|
|
_search_test(user2, "ER2")
|
|
|
|
|
_search_test(user2, "NAME 2")
|
2020-12-17 05:43:37 -05:00
|
|
|
|
|
2021-01-21 09:18:46 -05:00
|
|
|
|
_search_test(user1, "ER1", "user_id")
|
|
|
|
|
_search_test(user2, "ER2", "user_id")
|
2020-12-17 05:43:37 -05:00
|
|
|
|
|
|
|
|
|
_search_test(None, "foo")
|
|
|
|
|
_search_test(None, "bar")
|
|
|
|
|
|
|
|
|
|
_search_test(None, "foo", "user_id")
|
|
|
|
|
_search_test(None, "bar", "user_id")
|
|
|
|
|
|
2021-01-21 09:18:46 -05:00
|
|
|
|
def test_invalid_parameter(self):
|
|
|
|
|
"""
|
|
|
|
|
If parameters are invalid, an error is returned.
|
|
|
|
|
"""
|
|
|
|
|
|
|
|
|
|
# negative limit
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
self.url + "?limit=-5",
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2021-01-21 09:18:46 -05:00
|
|
|
|
self.assertEqual(Codes.INVALID_PARAM, channel.json_body["errcode"])
|
|
|
|
|
|
|
|
|
|
# negative from
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
self.url + "?from=-5",
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2021-01-21 09:18:46 -05:00
|
|
|
|
self.assertEqual(Codes.INVALID_PARAM, channel.json_body["errcode"])
|
|
|
|
|
|
|
|
|
|
# invalid guests
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
self.url + "?guests=not_bool",
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2021-12-09 06:23:34 -05:00
|
|
|
|
self.assertEqual(Codes.INVALID_PARAM, channel.json_body["errcode"])
|
2021-01-21 09:18:46 -05:00
|
|
|
|
|
|
|
|
|
# invalid deactivated
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
self.url + "?deactivated=not_bool",
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2021-12-09 06:23:34 -05:00
|
|
|
|
self.assertEqual(Codes.INVALID_PARAM, channel.json_body["errcode"])
|
2021-01-21 09:18:46 -05:00
|
|
|
|
|
2021-04-01 06:28:53 -04:00
|
|
|
|
# unkown order_by
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
self.url + "?order_by=bar",
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2021-12-09 06:23:34 -05:00
|
|
|
|
self.assertEqual(Codes.INVALID_PARAM, channel.json_body["errcode"])
|
2021-04-01 06:28:53 -04:00
|
|
|
|
|
|
|
|
|
# invalid search order
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
self.url + "?dir=bar",
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2021-12-09 06:23:34 -05:00
|
|
|
|
self.assertEqual(Codes.INVALID_PARAM, channel.json_body["errcode"])
|
2021-04-01 06:28:53 -04:00
|
|
|
|
|
2021-01-21 09:18:46 -05:00
|
|
|
|
def test_limit(self):
|
|
|
|
|
"""
|
|
|
|
|
Testing list of users with limit
|
|
|
|
|
"""
|
|
|
|
|
|
|
|
|
|
number_users = 20
|
|
|
|
|
# Create one less user (since there's already an admin user).
|
|
|
|
|
self._create_users(number_users - 1)
|
|
|
|
|
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
self.url + "?limit=5",
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-01-21 09:18:46 -05:00
|
|
|
|
self.assertEqual(channel.json_body["total"], number_users)
|
|
|
|
|
self.assertEqual(len(channel.json_body["users"]), 5)
|
|
|
|
|
self.assertEqual(channel.json_body["next_token"], "5")
|
|
|
|
|
self._check_fields(channel.json_body["users"])
|
|
|
|
|
|
|
|
|
|
def test_from(self):
|
|
|
|
|
"""
|
|
|
|
|
Testing list of users with a defined starting point (from)
|
|
|
|
|
"""
|
|
|
|
|
|
|
|
|
|
number_users = 20
|
|
|
|
|
# Create one less user (since there's already an admin user).
|
|
|
|
|
self._create_users(number_users - 1)
|
|
|
|
|
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
self.url + "?from=5",
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-01-21 09:18:46 -05:00
|
|
|
|
self.assertEqual(channel.json_body["total"], number_users)
|
|
|
|
|
self.assertEqual(len(channel.json_body["users"]), 15)
|
|
|
|
|
self.assertNotIn("next_token", channel.json_body)
|
|
|
|
|
self._check_fields(channel.json_body["users"])
|
|
|
|
|
|
|
|
|
|
def test_limit_and_from(self):
|
|
|
|
|
"""
|
|
|
|
|
Testing list of users with a defined starting point and limit
|
|
|
|
|
"""
|
|
|
|
|
|
|
|
|
|
number_users = 20
|
|
|
|
|
# Create one less user (since there's already an admin user).
|
|
|
|
|
self._create_users(number_users - 1)
|
|
|
|
|
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
self.url + "?from=5&limit=10",
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-01-21 09:18:46 -05:00
|
|
|
|
self.assertEqual(channel.json_body["total"], number_users)
|
|
|
|
|
self.assertEqual(channel.json_body["next_token"], "15")
|
|
|
|
|
self.assertEqual(len(channel.json_body["users"]), 10)
|
|
|
|
|
self._check_fields(channel.json_body["users"])
|
|
|
|
|
|
|
|
|
|
def test_next_token(self):
|
|
|
|
|
"""
|
|
|
|
|
Testing that `next_token` appears at the right place
|
|
|
|
|
"""
|
|
|
|
|
|
|
|
|
|
number_users = 20
|
|
|
|
|
# Create one less user (since there's already an admin user).
|
|
|
|
|
self._create_users(number_users - 1)
|
|
|
|
|
|
|
|
|
|
# `next_token` does not appear
|
|
|
|
|
# Number of results is the number of entries
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
self.url + "?limit=20",
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-01-21 09:18:46 -05:00
|
|
|
|
self.assertEqual(channel.json_body["total"], number_users)
|
|
|
|
|
self.assertEqual(len(channel.json_body["users"]), number_users)
|
|
|
|
|
self.assertNotIn("next_token", channel.json_body)
|
|
|
|
|
|
|
|
|
|
# `next_token` does not appear
|
|
|
|
|
# Number of max results is larger than the number of entries
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
self.url + "?limit=21",
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-01-21 09:18:46 -05:00
|
|
|
|
self.assertEqual(channel.json_body["total"], number_users)
|
|
|
|
|
self.assertEqual(len(channel.json_body["users"]), number_users)
|
|
|
|
|
self.assertNotIn("next_token", channel.json_body)
|
|
|
|
|
|
|
|
|
|
# `next_token` does appear
|
|
|
|
|
# Number of max results is smaller than the number of entries
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
self.url + "?limit=19",
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-01-21 09:18:46 -05:00
|
|
|
|
self.assertEqual(channel.json_body["total"], number_users)
|
|
|
|
|
self.assertEqual(len(channel.json_body["users"]), 19)
|
|
|
|
|
self.assertEqual(channel.json_body["next_token"], "19")
|
|
|
|
|
|
|
|
|
|
# Check
|
|
|
|
|
# Set `from` to value of `next_token` for request remaining entries
|
|
|
|
|
# `next_token` does not appear
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
self.url + "?from=19",
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-01-21 09:18:46 -05:00
|
|
|
|
self.assertEqual(channel.json_body["total"], number_users)
|
|
|
|
|
self.assertEqual(len(channel.json_body["users"]), 1)
|
|
|
|
|
self.assertNotIn("next_token", channel.json_body)
|
|
|
|
|
|
2021-04-01 06:28:53 -04:00
|
|
|
|
def test_order_by(self):
|
|
|
|
|
"""
|
|
|
|
|
Testing order list with parameter `order_by`
|
|
|
|
|
"""
|
|
|
|
|
|
2021-07-22 10:05:16 -04:00
|
|
|
|
# make sure that the users do not have the same timestamps
|
|
|
|
|
self.reactor.advance(10)
|
2021-04-01 06:28:53 -04:00
|
|
|
|
user1 = self.register_user("user1", "pass1", admin=False, displayname="Name Z")
|
2021-07-22 10:05:16 -04:00
|
|
|
|
self.reactor.advance(10)
|
2021-04-01 06:28:53 -04:00
|
|
|
|
user2 = self.register_user("user2", "pass2", admin=False, displayname="Name Y")
|
|
|
|
|
|
|
|
|
|
# Modify user
|
|
|
|
|
self.get_success(self.store.set_user_deactivated_status(user1, True))
|
|
|
|
|
self.get_success(self.store.set_shadow_banned(UserID.from_string(user1), True))
|
|
|
|
|
|
|
|
|
|
# Set avatar URL to all users, that no user has a NULL value to avoid
|
|
|
|
|
# different sort order between SQlite and PostreSQL
|
|
|
|
|
self.get_success(self.store.set_profile_avatar_url("user1", "mxc://url3"))
|
|
|
|
|
self.get_success(self.store.set_profile_avatar_url("user2", "mxc://url2"))
|
|
|
|
|
self.get_success(self.store.set_profile_avatar_url("admin", "mxc://url1"))
|
|
|
|
|
|
|
|
|
|
# order by default (name)
|
|
|
|
|
self._order_test([self.admin_user, user1, user2], None)
|
|
|
|
|
self._order_test([self.admin_user, user1, user2], None, "f")
|
|
|
|
|
self._order_test([user2, user1, self.admin_user], None, "b")
|
|
|
|
|
|
|
|
|
|
# order by name
|
|
|
|
|
self._order_test([self.admin_user, user1, user2], "name")
|
|
|
|
|
self._order_test([self.admin_user, user1, user2], "name", "f")
|
|
|
|
|
self._order_test([user2, user1, self.admin_user], "name", "b")
|
|
|
|
|
|
|
|
|
|
# order by displayname
|
|
|
|
|
self._order_test([user2, user1, self.admin_user], "displayname")
|
|
|
|
|
self._order_test([user2, user1, self.admin_user], "displayname", "f")
|
|
|
|
|
self._order_test([self.admin_user, user1, user2], "displayname", "b")
|
|
|
|
|
|
|
|
|
|
# order by is_guest
|
|
|
|
|
# like sort by ascending name, as no guest user here
|
|
|
|
|
self._order_test([self.admin_user, user1, user2], "is_guest")
|
|
|
|
|
self._order_test([self.admin_user, user1, user2], "is_guest", "f")
|
|
|
|
|
self._order_test([self.admin_user, user1, user2], "is_guest", "b")
|
|
|
|
|
|
|
|
|
|
# order by admin
|
|
|
|
|
self._order_test([user1, user2, self.admin_user], "admin")
|
|
|
|
|
self._order_test([user1, user2, self.admin_user], "admin", "f")
|
|
|
|
|
self._order_test([self.admin_user, user1, user2], "admin", "b")
|
|
|
|
|
|
|
|
|
|
# order by deactivated
|
|
|
|
|
self._order_test([self.admin_user, user2, user1], "deactivated")
|
|
|
|
|
self._order_test([self.admin_user, user2, user1], "deactivated", "f")
|
|
|
|
|
self._order_test([user1, self.admin_user, user2], "deactivated", "b")
|
|
|
|
|
|
|
|
|
|
# order by user_type
|
|
|
|
|
# like sort by ascending name, as no special user type here
|
|
|
|
|
self._order_test([self.admin_user, user1, user2], "user_type")
|
|
|
|
|
self._order_test([self.admin_user, user1, user2], "user_type", "f")
|
|
|
|
|
self._order_test([self.admin_user, user1, user2], "is_guest", "b")
|
|
|
|
|
|
|
|
|
|
# order by shadow_banned
|
|
|
|
|
self._order_test([self.admin_user, user2, user1], "shadow_banned")
|
|
|
|
|
self._order_test([self.admin_user, user2, user1], "shadow_banned", "f")
|
|
|
|
|
self._order_test([user1, self.admin_user, user2], "shadow_banned", "b")
|
|
|
|
|
|
|
|
|
|
# order by avatar_url
|
|
|
|
|
self._order_test([self.admin_user, user2, user1], "avatar_url")
|
|
|
|
|
self._order_test([self.admin_user, user2, user1], "avatar_url", "f")
|
|
|
|
|
self._order_test([user1, user2, self.admin_user], "avatar_url", "b")
|
|
|
|
|
|
2021-07-22 10:05:16 -04:00
|
|
|
|
# order by creation_ts
|
|
|
|
|
self._order_test([self.admin_user, user1, user2], "creation_ts")
|
|
|
|
|
self._order_test([self.admin_user, user1, user2], "creation_ts", "f")
|
|
|
|
|
self._order_test([user2, user1, self.admin_user], "creation_ts", "b")
|
|
|
|
|
|
2021-04-01 06:28:53 -04:00
|
|
|
|
def _order_test(
|
|
|
|
|
self,
|
|
|
|
|
expected_user_list: List[str],
|
|
|
|
|
order_by: Optional[str],
|
|
|
|
|
dir: Optional[str] = None,
|
|
|
|
|
):
|
|
|
|
|
"""Request the list of users in a certain order. Assert that order is what
|
|
|
|
|
we expect
|
|
|
|
|
Args:
|
|
|
|
|
expected_user_list: The list of user_id in the order we expect to get
|
|
|
|
|
back from the server
|
|
|
|
|
order_by: The type of ordering to give the server
|
|
|
|
|
dir: The direction of ordering to give the server
|
|
|
|
|
"""
|
|
|
|
|
|
|
|
|
|
url = self.url + "?deactivated=true&"
|
|
|
|
|
if order_by is not None:
|
|
|
|
|
url += "order_by=%s&" % (order_by,)
|
|
|
|
|
if dir is not None and dir in ("b", "f"):
|
|
|
|
|
url += "dir=%s" % (dir,)
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
2021-07-22 10:05:16 -04:00
|
|
|
|
url,
|
2021-04-01 06:28:53 -04:00
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-04-01 06:28:53 -04:00
|
|
|
|
self.assertEqual(channel.json_body["total"], len(expected_user_list))
|
|
|
|
|
|
|
|
|
|
returned_order = [row["name"] for row in channel.json_body["users"]]
|
|
|
|
|
self.assertEqual(expected_user_list, returned_order)
|
|
|
|
|
self._check_fields(channel.json_body["users"])
|
|
|
|
|
|
2021-12-03 08:57:13 -05:00
|
|
|
|
def _check_fields(self, content: List[JsonDict]):
|
2021-01-21 09:18:46 -05:00
|
|
|
|
"""Checks that the expected user attributes are present in content
|
|
|
|
|
Args:
|
|
|
|
|
content: List that is checked for content
|
|
|
|
|
"""
|
|
|
|
|
for u in content:
|
|
|
|
|
self.assertIn("name", u)
|
|
|
|
|
self.assertIn("is_guest", u)
|
|
|
|
|
self.assertIn("admin", u)
|
|
|
|
|
self.assertIn("user_type", u)
|
|
|
|
|
self.assertIn("deactivated", u)
|
2021-02-17 15:19:23 -05:00
|
|
|
|
self.assertIn("shadow_banned", u)
|
2021-01-21 09:18:46 -05:00
|
|
|
|
self.assertIn("displayname", u)
|
|
|
|
|
self.assertIn("avatar_url", u)
|
2021-07-22 10:05:16 -04:00
|
|
|
|
self.assertIn("creation_ts", u)
|
2021-01-21 09:18:46 -05:00
|
|
|
|
|
|
|
|
|
def _create_users(self, number_users: int):
|
|
|
|
|
"""
|
|
|
|
|
Create a number of users
|
|
|
|
|
Args:
|
|
|
|
|
number_users: Number of users to be created
|
|
|
|
|
"""
|
|
|
|
|
for i in range(1, number_users + 1):
|
|
|
|
|
self.register_user(
|
|
|
|
|
"user%d" % i,
|
|
|
|
|
"pass%d" % i,
|
|
|
|
|
admin=False,
|
|
|
|
|
displayname="Name %d" % i,
|
|
|
|
|
)
|
|
|
|
|
|
2020-01-09 08:31:00 -05:00
|
|
|
|
|
2021-01-12 16:30:15 -05:00
|
|
|
|
class DeactivateAccountTestCase(unittest.HomeserverTestCase):
|
|
|
|
|
|
|
|
|
|
servlets = [
|
|
|
|
|
synapse.rest.admin.register_servlets,
|
|
|
|
|
login.register_servlets,
|
|
|
|
|
]
|
|
|
|
|
|
|
|
|
|
def prepare(self, reactor, clock, hs):
|
|
|
|
|
self.store = hs.get_datastore()
|
|
|
|
|
|
|
|
|
|
self.admin_user = self.register_user("admin", "pass", admin=True)
|
|
|
|
|
self.admin_user_tok = self.login("admin", "pass")
|
|
|
|
|
|
|
|
|
|
self.other_user = self.register_user("user", "pass", displayname="User1")
|
|
|
|
|
self.other_user_token = self.login("user", "pass")
|
|
|
|
|
self.url_other_user = "/_synapse/admin/v2/users/%s" % urllib.parse.quote(
|
|
|
|
|
self.other_user
|
|
|
|
|
)
|
|
|
|
|
self.url = "/_synapse/admin/v1/deactivate/%s" % urllib.parse.quote(
|
|
|
|
|
self.other_user
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
# set attributes for user
|
|
|
|
|
self.get_success(
|
|
|
|
|
self.store.set_profile_avatar_url("user", "mxc://servername/mediaid")
|
|
|
|
|
)
|
|
|
|
|
self.get_success(
|
|
|
|
|
self.store.user_add_threepid("@user:test", "email", "foo@bar.com", 0, 0)
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
def test_no_auth(self):
|
|
|
|
|
"""
|
|
|
|
|
Try to deactivate users without authentication.
|
|
|
|
|
"""
|
|
|
|
|
channel = self.make_request("POST", self.url, b"{}")
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.UNAUTHORIZED, channel.code, msg=channel.json_body)
|
2021-01-12 16:30:15 -05:00
|
|
|
|
self.assertEqual(Codes.MISSING_TOKEN, channel.json_body["errcode"])
|
|
|
|
|
|
|
|
|
|
def test_requester_is_not_admin(self):
|
|
|
|
|
"""
|
|
|
|
|
If the user is not a server admin, an error is returned.
|
|
|
|
|
"""
|
|
|
|
|
url = "/_synapse/admin/v1/deactivate/@bob:test"
|
|
|
|
|
|
|
|
|
|
channel = self.make_request("POST", url, access_token=self.other_user_token)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.FORBIDDEN, channel.code, msg=channel.json_body)
|
2021-01-12 16:30:15 -05:00
|
|
|
|
self.assertEqual("You are not a server admin", channel.json_body["error"])
|
|
|
|
|
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"POST",
|
|
|
|
|
url,
|
|
|
|
|
access_token=self.other_user_token,
|
|
|
|
|
content=b"{}",
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.FORBIDDEN, channel.code, msg=channel.json_body)
|
2021-01-12 16:30:15 -05:00
|
|
|
|
self.assertEqual("You are not a server admin", channel.json_body["error"])
|
|
|
|
|
|
|
|
|
|
def test_user_does_not_exist(self):
|
|
|
|
|
"""
|
2021-11-30 04:53:54 -05:00
|
|
|
|
Tests that deactivation for a user that does not exist returns a HTTPStatus.NOT_FOUND
|
2021-01-12 16:30:15 -05:00
|
|
|
|
"""
|
|
|
|
|
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"POST",
|
|
|
|
|
"/_synapse/admin/v1/deactivate/@unknown_person:test",
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.NOT_FOUND, channel.code, msg=channel.json_body)
|
2021-01-12 16:30:15 -05:00
|
|
|
|
self.assertEqual(Codes.NOT_FOUND, channel.json_body["errcode"])
|
|
|
|
|
|
|
|
|
|
def test_erase_is_not_bool(self):
|
|
|
|
|
"""
|
|
|
|
|
If parameter `erase` is not boolean, return an error
|
|
|
|
|
"""
|
|
|
|
|
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"POST",
|
|
|
|
|
self.url,
|
2021-10-12 15:38:48 -04:00
|
|
|
|
content={"erase": "False"},
|
2021-01-12 16:30:15 -05:00
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2021-01-12 16:30:15 -05:00
|
|
|
|
self.assertEqual(Codes.BAD_JSON, channel.json_body["errcode"])
|
|
|
|
|
|
|
|
|
|
def test_user_is_not_local(self):
|
|
|
|
|
"""
|
2021-11-30 04:53:54 -05:00
|
|
|
|
Tests that deactivation for a user that is not a local returns a HTTPStatus.BAD_REQUEST
|
2021-01-12 16:30:15 -05:00
|
|
|
|
"""
|
|
|
|
|
url = "/_synapse/admin/v1/deactivate/@unknown_person:unknown_domain"
|
|
|
|
|
|
|
|
|
|
channel = self.make_request("POST", url, access_token=self.admin_user_tok)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2021-01-12 16:30:15 -05:00
|
|
|
|
self.assertEqual("Can only deactivate local users", channel.json_body["error"])
|
|
|
|
|
|
|
|
|
|
def test_deactivate_user_erase_true(self):
|
|
|
|
|
"""
|
2021-07-06 08:08:53 -04:00
|
|
|
|
Test deactivating a user and set `erase` to `true`
|
2021-01-12 16:30:15 -05:00
|
|
|
|
"""
|
|
|
|
|
|
|
|
|
|
# Get user
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-01-12 16:30:15 -05:00
|
|
|
|
self.assertEqual("@user:test", channel.json_body["name"])
|
|
|
|
|
self.assertEqual(False, channel.json_body["deactivated"])
|
|
|
|
|
self.assertEqual("foo@bar.com", channel.json_body["threepids"][0]["address"])
|
|
|
|
|
self.assertEqual("mxc://servername/mediaid", channel.json_body["avatar_url"])
|
|
|
|
|
self.assertEqual("User1", channel.json_body["displayname"])
|
|
|
|
|
|
2021-07-06 08:08:53 -04:00
|
|
|
|
# Deactivate and erase user
|
2021-01-12 16:30:15 -05:00
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"POST",
|
|
|
|
|
self.url,
|
|
|
|
|
access_token=self.admin_user_tok,
|
2021-07-06 08:08:53 -04:00
|
|
|
|
content={"erase": True},
|
2021-01-12 16:30:15 -05:00
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-01-12 16:30:15 -05:00
|
|
|
|
|
|
|
|
|
# Get user
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-01-12 16:30:15 -05:00
|
|
|
|
self.assertEqual("@user:test", channel.json_body["name"])
|
|
|
|
|
self.assertEqual(True, channel.json_body["deactivated"])
|
|
|
|
|
self.assertEqual(0, len(channel.json_body["threepids"]))
|
|
|
|
|
self.assertIsNone(channel.json_body["avatar_url"])
|
|
|
|
|
self.assertIsNone(channel.json_body["displayname"])
|
|
|
|
|
|
|
|
|
|
self._is_erased("@user:test", True)
|
|
|
|
|
|
|
|
|
|
def test_deactivate_user_erase_false(self):
|
|
|
|
|
"""
|
2021-07-06 08:08:53 -04:00
|
|
|
|
Test deactivating a user and set `erase` to `false`
|
2021-01-12 16:30:15 -05:00
|
|
|
|
"""
|
|
|
|
|
|
|
|
|
|
# Get user
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-01-12 16:30:15 -05:00
|
|
|
|
self.assertEqual("@user:test", channel.json_body["name"])
|
|
|
|
|
self.assertEqual(False, channel.json_body["deactivated"])
|
|
|
|
|
self.assertEqual("foo@bar.com", channel.json_body["threepids"][0]["address"])
|
|
|
|
|
self.assertEqual("mxc://servername/mediaid", channel.json_body["avatar_url"])
|
|
|
|
|
self.assertEqual("User1", channel.json_body["displayname"])
|
|
|
|
|
|
|
|
|
|
# Deactivate user
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"POST",
|
|
|
|
|
self.url,
|
|
|
|
|
access_token=self.admin_user_tok,
|
2021-07-06 08:08:53 -04:00
|
|
|
|
content={"erase": False},
|
2021-01-12 16:30:15 -05:00
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-01-12 16:30:15 -05:00
|
|
|
|
|
|
|
|
|
# Get user
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-01-12 16:30:15 -05:00
|
|
|
|
self.assertEqual("@user:test", channel.json_body["name"])
|
|
|
|
|
self.assertEqual(True, channel.json_body["deactivated"])
|
|
|
|
|
self.assertEqual(0, len(channel.json_body["threepids"]))
|
|
|
|
|
self.assertEqual("mxc://servername/mediaid", channel.json_body["avatar_url"])
|
|
|
|
|
self.assertEqual("User1", channel.json_body["displayname"])
|
|
|
|
|
|
|
|
|
|
self._is_erased("@user:test", False)
|
|
|
|
|
|
2021-07-06 08:08:53 -04:00
|
|
|
|
def test_deactivate_user_erase_true_no_profile(self):
|
|
|
|
|
"""
|
|
|
|
|
Test deactivating a user and set `erase` to `true`
|
|
|
|
|
if user has no profile information (stored in the database table `profiles`).
|
|
|
|
|
"""
|
|
|
|
|
|
|
|
|
|
# Users normally have an entry in `profiles`, but occasionally they are created without one.
|
|
|
|
|
# To test deactivation for users without a profile, we delete the profile information for our user.
|
|
|
|
|
self.get_success(
|
|
|
|
|
self.store.db_pool.simple_delete_one(
|
|
|
|
|
table="profiles", keyvalues={"user_id": "user"}
|
|
|
|
|
)
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
# Get user
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-07-06 08:08:53 -04:00
|
|
|
|
self.assertEqual("@user:test", channel.json_body["name"])
|
|
|
|
|
self.assertEqual(False, channel.json_body["deactivated"])
|
|
|
|
|
self.assertEqual("foo@bar.com", channel.json_body["threepids"][0]["address"])
|
|
|
|
|
self.assertIsNone(channel.json_body["avatar_url"])
|
|
|
|
|
self.assertIsNone(channel.json_body["displayname"])
|
|
|
|
|
|
|
|
|
|
# Deactivate and erase user
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"POST",
|
|
|
|
|
self.url,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
content={"erase": True},
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-07-06 08:08:53 -04:00
|
|
|
|
|
|
|
|
|
# Get user
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-07-06 08:08:53 -04:00
|
|
|
|
self.assertEqual("@user:test", channel.json_body["name"])
|
|
|
|
|
self.assertEqual(True, channel.json_body["deactivated"])
|
|
|
|
|
self.assertEqual(0, len(channel.json_body["threepids"]))
|
|
|
|
|
self.assertIsNone(channel.json_body["avatar_url"])
|
|
|
|
|
self.assertIsNone(channel.json_body["displayname"])
|
|
|
|
|
|
|
|
|
|
self._is_erased("@user:test", True)
|
|
|
|
|
|
2021-01-12 16:30:15 -05:00
|
|
|
|
def _is_erased(self, user_id: str, expect: bool) -> None:
|
|
|
|
|
"""Assert that the user is erased or not"""
|
|
|
|
|
d = self.store.is_user_erased(user_id)
|
|
|
|
|
if expect:
|
|
|
|
|
self.assertTrue(self.get_success(d))
|
|
|
|
|
else:
|
|
|
|
|
self.assertFalse(self.get_success(d))
|
|
|
|
|
|
|
|
|
|
|
2020-01-09 08:31:00 -05:00
|
|
|
|
class UserRestTestCase(unittest.HomeserverTestCase):
|
|
|
|
|
|
|
|
|
|
servlets = [
|
|
|
|
|
synapse.rest.admin.register_servlets,
|
|
|
|
|
login.register_servlets,
|
2020-06-05 08:08:49 -04:00
|
|
|
|
sync.register_servlets,
|
2020-01-09 08:31:00 -05:00
|
|
|
|
]
|
|
|
|
|
|
|
|
|
|
def prepare(self, reactor, clock, hs):
|
|
|
|
|
self.store = hs.get_datastore()
|
2021-03-18 12:54:08 -04:00
|
|
|
|
self.auth_handler = hs.get_auth_handler()
|
2020-01-09 08:31:00 -05:00
|
|
|
|
|
2021-03-18 12:54:08 -04:00
|
|
|
|
# create users and get access tokens
|
|
|
|
|
# regardless of whether password login or SSO is allowed
|
2020-01-09 08:31:00 -05:00
|
|
|
|
self.admin_user = self.register_user("admin", "pass", admin=True)
|
2021-03-18 12:54:08 -04:00
|
|
|
|
self.admin_user_tok = self.get_success(
|
2021-11-17 09:10:57 -05:00
|
|
|
|
self.auth_handler.create_access_token_for_user_id(
|
2021-03-18 12:54:08 -04:00
|
|
|
|
self.admin_user, device_id=None, valid_until_ms=None
|
|
|
|
|
)
|
|
|
|
|
)
|
2020-01-09 08:31:00 -05:00
|
|
|
|
|
2020-12-17 07:05:39 -05:00
|
|
|
|
self.other_user = self.register_user("user", "pass", displayname="User")
|
2021-03-18 12:54:08 -04:00
|
|
|
|
self.other_user_token = self.get_success(
|
2021-11-17 09:10:57 -05:00
|
|
|
|
self.auth_handler.create_access_token_for_user_id(
|
2021-03-18 12:54:08 -04:00
|
|
|
|
self.other_user, device_id=None, valid_until_ms=None
|
|
|
|
|
)
|
|
|
|
|
)
|
2021-10-21 04:52:32 -04:00
|
|
|
|
self.url_prefix = "/_synapse/admin/v2/users/%s"
|
|
|
|
|
self.url_other_user = self.url_prefix % self.other_user
|
2020-01-09 08:31:00 -05:00
|
|
|
|
|
|
|
|
|
def test_requester_is_no_admin(self):
|
|
|
|
|
"""
|
|
|
|
|
If the user is not a server admin, an error is returned.
|
|
|
|
|
"""
|
2020-02-28 04:58:05 -05:00
|
|
|
|
url = "/_synapse/admin/v2/users/@bob:test"
|
2020-01-09 08:31:00 -05:00
|
|
|
|
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
url,
|
|
|
|
|
access_token=self.other_user_token,
|
|
|
|
|
)
|
2020-01-09 08:31:00 -05:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.FORBIDDEN, channel.code, msg=channel.json_body)
|
2020-01-09 08:31:00 -05:00
|
|
|
|
self.assertEqual("You are not a server admin", channel.json_body["error"])
|
|
|
|
|
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
2020-02-28 04:58:05 -05:00
|
|
|
|
"PUT",
|
|
|
|
|
url,
|
|
|
|
|
access_token=self.other_user_token,
|
|
|
|
|
content=b"{}",
|
2020-01-09 08:31:00 -05:00
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.FORBIDDEN, channel.code, msg=channel.json_body)
|
2020-01-09 08:31:00 -05:00
|
|
|
|
self.assertEqual("You are not a server admin", channel.json_body["error"])
|
|
|
|
|
|
2020-02-12 13:14:10 -05:00
|
|
|
|
def test_user_does_not_exist(self):
|
|
|
|
|
"""
|
2021-11-30 04:53:54 -05:00
|
|
|
|
Tests that a lookup for a user that does not exist returns a HTTPStatus.NOT_FOUND
|
2020-02-12 13:14:10 -05:00
|
|
|
|
"""
|
|
|
|
|
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
2020-02-12 13:14:10 -05:00
|
|
|
|
"GET",
|
|
|
|
|
"/_synapse/admin/v2/users/@unknown_person:test",
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.NOT_FOUND, channel.code, msg=channel.json_body)
|
2020-02-12 13:14:10 -05:00
|
|
|
|
self.assertEqual("M_NOT_FOUND", channel.json_body["errcode"])
|
|
|
|
|
|
2021-08-17 06:56:11 -04:00
|
|
|
|
def test_invalid_parameter(self):
|
2021-07-01 05:26:24 -04:00
|
|
|
|
"""
|
2021-08-17 06:56:11 -04:00
|
|
|
|
If parameters are invalid, an error is returned.
|
2021-07-01 05:26:24 -04:00
|
|
|
|
"""
|
2021-08-17 06:56:11 -04:00
|
|
|
|
|
|
|
|
|
# admin not bool
|
2021-07-01 05:26:24 -04:00
|
|
|
|
channel = self.make_request(
|
2021-08-17 06:56:11 -04:00
|
|
|
|
"PUT",
|
2021-07-01 05:26:24 -04:00
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
2021-08-17 06:56:11 -04:00
|
|
|
|
content={"admin": "not_bool"},
|
2021-07-01 05:26:24 -04:00
|
|
|
|
)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2021-08-17 06:56:11 -04:00
|
|
|
|
self.assertEqual(Codes.BAD_JSON, channel.json_body["errcode"])
|
2021-07-01 05:26:24 -04:00
|
|
|
|
|
2021-08-17 06:56:11 -04:00
|
|
|
|
# deactivated not bool
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"PUT",
|
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
content={"deactivated": "not_bool"},
|
|
|
|
|
)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2021-08-17 06:56:11 -04:00
|
|
|
|
self.assertEqual(Codes.UNKNOWN, channel.json_body["errcode"])
|
2021-07-01 05:26:24 -04:00
|
|
|
|
|
2021-08-17 06:56:11 -04:00
|
|
|
|
# password not str
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"PUT",
|
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
content={"password": True},
|
2021-07-01 05:26:24 -04:00
|
|
|
|
)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2021-08-17 06:56:11 -04:00
|
|
|
|
self.assertEqual(Codes.UNKNOWN, channel.json_body["errcode"])
|
|
|
|
|
|
|
|
|
|
# password not length
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"PUT",
|
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
content={"password": "x" * 513},
|
2021-07-01 05:26:24 -04:00
|
|
|
|
)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2021-08-17 06:56:11 -04:00
|
|
|
|
self.assertEqual(Codes.UNKNOWN, channel.json_body["errcode"])
|
2021-07-01 05:26:24 -04:00
|
|
|
|
|
2021-08-17 06:56:11 -04:00
|
|
|
|
# user_type not valid
|
2021-07-01 05:26:24 -04:00
|
|
|
|
channel = self.make_request(
|
2021-08-17 06:56:11 -04:00
|
|
|
|
"PUT",
|
2021-07-01 05:26:24 -04:00
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
2021-08-17 06:56:11 -04:00
|
|
|
|
content={"user_type": "new type"},
|
2021-07-01 05:26:24 -04:00
|
|
|
|
)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2021-08-17 06:56:11 -04:00
|
|
|
|
self.assertEqual(Codes.UNKNOWN, channel.json_body["errcode"])
|
2021-07-01 05:26:24 -04:00
|
|
|
|
|
2021-08-17 06:56:11 -04:00
|
|
|
|
# external_ids not valid
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"PUT",
|
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
content={
|
|
|
|
|
"external_ids": {"auth_provider": "prov", "wrong_external_id": "id"}
|
|
|
|
|
},
|
2021-07-01 05:26:24 -04:00
|
|
|
|
)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2021-08-17 06:56:11 -04:00
|
|
|
|
self.assertEqual(Codes.MISSING_PARAM, channel.json_body["errcode"])
|
|
|
|
|
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"PUT",
|
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
content={"external_ids": {"external_id": "id"}},
|
2021-07-01 05:26:24 -04:00
|
|
|
|
)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2021-08-17 06:56:11 -04:00
|
|
|
|
self.assertEqual(Codes.MISSING_PARAM, channel.json_body["errcode"])
|
|
|
|
|
|
|
|
|
|
# threepids not valid
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"PUT",
|
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
content={"threepids": {"medium": "email", "wrong_address": "id"}},
|
2021-07-01 05:26:24 -04:00
|
|
|
|
)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2021-08-17 06:56:11 -04:00
|
|
|
|
self.assertEqual(Codes.MISSING_PARAM, channel.json_body["errcode"])
|
|
|
|
|
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"PUT",
|
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
content={"threepids": {"address": "value"}},
|
|
|
|
|
)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2021-08-17 06:56:11 -04:00
|
|
|
|
self.assertEqual(Codes.MISSING_PARAM, channel.json_body["errcode"])
|
|
|
|
|
|
|
|
|
|
def test_get_user(self):
|
|
|
|
|
"""
|
|
|
|
|
Test a simple get of a user.
|
|
|
|
|
"""
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
2021-07-01 05:26:24 -04:00
|
|
|
|
)
|
2021-08-17 06:56:11 -04:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-08-17 06:56:11 -04:00
|
|
|
|
self.assertEqual("@user:test", channel.json_body["name"])
|
|
|
|
|
self.assertEqual("User", channel.json_body["displayname"])
|
2021-07-01 05:26:24 -04:00
|
|
|
|
self._check_fields(channel.json_body)
|
|
|
|
|
|
2020-02-28 04:58:05 -05:00
|
|
|
|
def test_create_server_admin(self):
|
2020-01-09 08:31:00 -05:00
|
|
|
|
"""
|
2020-02-28 04:58:05 -05:00
|
|
|
|
Check that a new admin user is created successfully.
|
2020-01-09 08:31:00 -05:00
|
|
|
|
"""
|
2020-02-28 04:58:05 -05:00
|
|
|
|
url = "/_synapse/admin/v2/users/@bob:test"
|
2020-01-09 08:31:00 -05:00
|
|
|
|
|
2020-02-28 04:58:05 -05:00
|
|
|
|
# Create user (server admin)
|
2021-07-01 05:26:24 -04:00
|
|
|
|
body = {
|
|
|
|
|
"password": "abc123",
|
|
|
|
|
"admin": True,
|
|
|
|
|
"displayname": "Bob's name",
|
|
|
|
|
"threepids": [{"medium": "email", "address": "bob@bob.bob"}],
|
|
|
|
|
"avatar_url": "mxc://fibble/wibble",
|
|
|
|
|
}
|
2020-01-09 08:31:00 -05:00
|
|
|
|
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
2020-02-28 04:58:05 -05:00
|
|
|
|
"PUT",
|
|
|
|
|
url,
|
|
|
|
|
access_token=self.admin_user_tok,
|
2021-07-01 05:26:24 -04:00
|
|
|
|
content=body,
|
2020-02-28 04:58:05 -05:00
|
|
|
|
)
|
|
|
|
|
|
2021-07-01 05:26:24 -04:00
|
|
|
|
self.assertEqual(201, channel.code, msg=channel.json_body)
|
2020-02-28 04:58:05 -05:00
|
|
|
|
self.assertEqual("@bob:test", channel.json_body["name"])
|
|
|
|
|
self.assertEqual("Bob's name", channel.json_body["displayname"])
|
|
|
|
|
self.assertEqual("email", channel.json_body["threepids"][0]["medium"])
|
|
|
|
|
self.assertEqual("bob@bob.bob", channel.json_body["threepids"][0]["address"])
|
2021-03-18 12:54:08 -04:00
|
|
|
|
self.assertTrue(channel.json_body["admin"])
|
2020-12-07 14:13:07 -05:00
|
|
|
|
self.assertEqual("mxc://fibble/wibble", channel.json_body["avatar_url"])
|
2021-07-01 05:26:24 -04:00
|
|
|
|
self._check_fields(channel.json_body)
|
2020-02-28 04:58:05 -05:00
|
|
|
|
|
|
|
|
|
# Get user
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
url,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
2020-02-28 04:58:05 -05:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-02-28 04:58:05 -05:00
|
|
|
|
self.assertEqual("@bob:test", channel.json_body["name"])
|
|
|
|
|
self.assertEqual("Bob's name", channel.json_body["displayname"])
|
|
|
|
|
self.assertEqual("email", channel.json_body["threepids"][0]["medium"])
|
|
|
|
|
self.assertEqual("bob@bob.bob", channel.json_body["threepids"][0]["address"])
|
2021-03-18 12:54:08 -04:00
|
|
|
|
self.assertTrue(channel.json_body["admin"])
|
|
|
|
|
self.assertFalse(channel.json_body["is_guest"])
|
|
|
|
|
self.assertFalse(channel.json_body["deactivated"])
|
2020-12-07 14:13:07 -05:00
|
|
|
|
self.assertEqual("mxc://fibble/wibble", channel.json_body["avatar_url"])
|
2021-07-01 05:26:24 -04:00
|
|
|
|
self._check_fields(channel.json_body)
|
2020-02-28 04:58:05 -05:00
|
|
|
|
|
|
|
|
|
def test_create_user(self):
|
|
|
|
|
"""
|
|
|
|
|
Check that a new regular user is created successfully.
|
|
|
|
|
"""
|
|
|
|
|
url = "/_synapse/admin/v2/users/@bob:test"
|
|
|
|
|
|
2020-01-09 08:31:00 -05:00
|
|
|
|
# Create user
|
2021-07-01 05:26:24 -04:00
|
|
|
|
body = {
|
|
|
|
|
"password": "abc123",
|
|
|
|
|
"admin": False,
|
|
|
|
|
"displayname": "Bob's name",
|
|
|
|
|
"threepids": [{"medium": "email", "address": "bob@bob.bob"}],
|
2021-08-17 06:56:11 -04:00
|
|
|
|
"external_ids": [
|
|
|
|
|
{
|
|
|
|
|
"external_id": "external_id1",
|
|
|
|
|
"auth_provider": "auth_provider1",
|
|
|
|
|
},
|
|
|
|
|
],
|
2021-07-01 05:26:24 -04:00
|
|
|
|
"avatar_url": "mxc://fibble/wibble",
|
|
|
|
|
}
|
2020-02-28 04:58:05 -05:00
|
|
|
|
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
2020-01-09 08:31:00 -05:00
|
|
|
|
"PUT",
|
2020-02-28 04:58:05 -05:00
|
|
|
|
url,
|
2020-01-09 08:31:00 -05:00
|
|
|
|
access_token=self.admin_user_tok,
|
2021-07-01 05:26:24 -04:00
|
|
|
|
content=body,
|
2020-01-09 08:31:00 -05:00
|
|
|
|
)
|
|
|
|
|
|
2021-07-01 05:26:24 -04:00
|
|
|
|
self.assertEqual(201, channel.code, msg=channel.json_body)
|
2020-01-09 08:31:00 -05:00
|
|
|
|
self.assertEqual("@bob:test", channel.json_body["name"])
|
2020-02-28 04:58:05 -05:00
|
|
|
|
self.assertEqual("Bob's name", channel.json_body["displayname"])
|
2020-02-07 05:29:36 -05:00
|
|
|
|
self.assertEqual("email", channel.json_body["threepids"][0]["medium"])
|
|
|
|
|
self.assertEqual("bob@bob.bob", channel.json_body["threepids"][0]["address"])
|
2021-08-19 05:25:05 -04:00
|
|
|
|
self.assertEqual(1, len(channel.json_body["threepids"]))
|
2021-08-17 06:56:11 -04:00
|
|
|
|
self.assertEqual(
|
|
|
|
|
"external_id1", channel.json_body["external_ids"][0]["external_id"]
|
|
|
|
|
)
|
|
|
|
|
self.assertEqual(
|
|
|
|
|
"auth_provider1", channel.json_body["external_ids"][0]["auth_provider"]
|
|
|
|
|
)
|
2021-08-19 05:25:05 -04:00
|
|
|
|
self.assertEqual(1, len(channel.json_body["external_ids"]))
|
2021-03-18 12:54:08 -04:00
|
|
|
|
self.assertFalse(channel.json_body["admin"])
|
2020-12-07 14:13:07 -05:00
|
|
|
|
self.assertEqual("mxc://fibble/wibble", channel.json_body["avatar_url"])
|
2021-07-01 05:26:24 -04:00
|
|
|
|
self._check_fields(channel.json_body)
|
2020-01-09 08:31:00 -05:00
|
|
|
|
|
|
|
|
|
# Get user
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
url,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
2020-01-09 08:31:00 -05:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-01-09 08:31:00 -05:00
|
|
|
|
self.assertEqual("@bob:test", channel.json_body["name"])
|
2020-02-28 04:58:05 -05:00
|
|
|
|
self.assertEqual("Bob's name", channel.json_body["displayname"])
|
|
|
|
|
self.assertEqual("email", channel.json_body["threepids"][0]["medium"])
|
|
|
|
|
self.assertEqual("bob@bob.bob", channel.json_body["threepids"][0]["address"])
|
2021-03-18 12:54:08 -04:00
|
|
|
|
self.assertFalse(channel.json_body["admin"])
|
|
|
|
|
self.assertFalse(channel.json_body["is_guest"])
|
|
|
|
|
self.assertFalse(channel.json_body["deactivated"])
|
|
|
|
|
self.assertFalse(channel.json_body["shadow_banned"])
|
2020-12-07 14:13:07 -05:00
|
|
|
|
self.assertEqual("mxc://fibble/wibble", channel.json_body["avatar_url"])
|
2021-07-01 05:26:24 -04:00
|
|
|
|
self._check_fields(channel.json_body)
|
2020-02-28 04:58:05 -05:00
|
|
|
|
|
2020-06-05 08:08:49 -04:00
|
|
|
|
@override_config(
|
|
|
|
|
{"limit_usage_by_mau": True, "max_mau_value": 2, "mau_trial_days": 0}
|
|
|
|
|
)
|
|
|
|
|
def test_create_user_mau_limit_reached_active_admin(self):
|
|
|
|
|
"""
|
|
|
|
|
Check that an admin can register a new user via the admin API
|
|
|
|
|
even if the MAU limit is reached.
|
|
|
|
|
Admin user was active before creating user.
|
|
|
|
|
"""
|
|
|
|
|
|
|
|
|
|
handler = self.hs.get_registration_handler()
|
|
|
|
|
|
|
|
|
|
# Sync to set admin user to active
|
|
|
|
|
# before limit of monthly active users is reached
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request("GET", "/sync", access_token=self.admin_user_tok)
|
2020-06-05 08:08:49 -04:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
if channel.code != HTTPStatus.OK:
|
2020-06-05 08:08:49 -04:00
|
|
|
|
raise HttpResponseException(
|
2021-11-30 04:53:54 -05:00
|
|
|
|
channel.code, channel.result["reason"], channel.json_body
|
2020-06-05 08:08:49 -04:00
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
# Set monthly active users to the limit
|
|
|
|
|
self.store.get_monthly_active_count = Mock(
|
2021-09-29 06:44:15 -04:00
|
|
|
|
return_value=make_awaitable(self.hs.config.server.max_mau_value)
|
2020-06-05 08:08:49 -04:00
|
|
|
|
)
|
|
|
|
|
# Check that the blocking of monthly active users is working as expected
|
|
|
|
|
# The registration of a new user fails due to the limit
|
|
|
|
|
self.get_failure(
|
|
|
|
|
handler.register_user(localpart="local_part"), ResourceLimitError
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
# Register new user with admin API
|
|
|
|
|
url = "/_synapse/admin/v2/users/@bob:test"
|
|
|
|
|
|
|
|
|
|
# Create user
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
2020-06-05 08:08:49 -04:00
|
|
|
|
"PUT",
|
|
|
|
|
url,
|
|
|
|
|
access_token=self.admin_user_tok,
|
2021-07-01 05:26:24 -04:00
|
|
|
|
content={"password": "abc123", "admin": False},
|
2020-06-05 08:08:49 -04:00
|
|
|
|
)
|
|
|
|
|
|
2021-07-01 05:26:24 -04:00
|
|
|
|
self.assertEqual(201, channel.code, msg=channel.json_body)
|
2020-06-05 08:08:49 -04:00
|
|
|
|
self.assertEqual("@bob:test", channel.json_body["name"])
|
2021-03-18 12:54:08 -04:00
|
|
|
|
self.assertFalse(channel.json_body["admin"])
|
2020-06-05 08:08:49 -04:00
|
|
|
|
|
|
|
|
|
@override_config(
|
|
|
|
|
{"limit_usage_by_mau": True, "max_mau_value": 2, "mau_trial_days": 0}
|
|
|
|
|
)
|
|
|
|
|
def test_create_user_mau_limit_reached_passive_admin(self):
|
|
|
|
|
"""
|
|
|
|
|
Check that an admin can register a new user via the admin API
|
|
|
|
|
even if the MAU limit is reached.
|
|
|
|
|
Admin user was not active before creating user.
|
|
|
|
|
"""
|
|
|
|
|
|
|
|
|
|
handler = self.hs.get_registration_handler()
|
|
|
|
|
|
|
|
|
|
# Set monthly active users to the limit
|
|
|
|
|
self.store.get_monthly_active_count = Mock(
|
2021-09-29 06:44:15 -04:00
|
|
|
|
return_value=make_awaitable(self.hs.config.server.max_mau_value)
|
2020-06-05 08:08:49 -04:00
|
|
|
|
)
|
|
|
|
|
# Check that the blocking of monthly active users is working as expected
|
|
|
|
|
# The registration of a new user fails due to the limit
|
|
|
|
|
self.get_failure(
|
|
|
|
|
handler.register_user(localpart="local_part"), ResourceLimitError
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
# Register new user with admin API
|
|
|
|
|
url = "/_synapse/admin/v2/users/@bob:test"
|
|
|
|
|
|
|
|
|
|
# Create user
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
2020-06-05 08:08:49 -04:00
|
|
|
|
"PUT",
|
|
|
|
|
url,
|
|
|
|
|
access_token=self.admin_user_tok,
|
2021-07-01 05:26:24 -04:00
|
|
|
|
content={"password": "abc123", "admin": False},
|
2020-06-05 08:08:49 -04:00
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
# Admin user is not blocked by mau anymore
|
2021-07-01 05:26:24 -04:00
|
|
|
|
self.assertEqual(201, channel.code, msg=channel.json_body)
|
2020-06-05 08:08:49 -04:00
|
|
|
|
self.assertEqual("@bob:test", channel.json_body["name"])
|
2021-03-18 12:54:08 -04:00
|
|
|
|
self.assertFalse(channel.json_body["admin"])
|
2020-06-05 08:08:49 -04:00
|
|
|
|
|
|
|
|
|
@override_config(
|
|
|
|
|
{
|
|
|
|
|
"email": {
|
|
|
|
|
"enable_notifs": True,
|
|
|
|
|
"notif_for_new_users": True,
|
|
|
|
|
"notif_from": "test@example.com",
|
|
|
|
|
},
|
|
|
|
|
"public_baseurl": "https://example.com",
|
|
|
|
|
}
|
|
|
|
|
)
|
2020-06-01 10:34:33 -04:00
|
|
|
|
def test_create_user_email_notif_for_new_users(self):
|
|
|
|
|
"""
|
|
|
|
|
Check that a new regular user is created successfully and
|
|
|
|
|
got an email pusher.
|
|
|
|
|
"""
|
|
|
|
|
url = "/_synapse/admin/v2/users/@bob:test"
|
|
|
|
|
|
|
|
|
|
# Create user
|
2021-07-01 05:26:24 -04:00
|
|
|
|
body = {
|
|
|
|
|
"password": "abc123",
|
2021-12-10 07:17:28 -05:00
|
|
|
|
# Note that the given email is not in canonical form.
|
|
|
|
|
"threepids": [{"medium": "email", "address": "Bob@bob.bob"}],
|
2021-07-01 05:26:24 -04:00
|
|
|
|
}
|
2020-06-01 10:34:33 -04:00
|
|
|
|
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
2020-06-01 10:34:33 -04:00
|
|
|
|
"PUT",
|
|
|
|
|
url,
|
|
|
|
|
access_token=self.admin_user_tok,
|
2021-07-01 05:26:24 -04:00
|
|
|
|
content=body,
|
2020-06-01 10:34:33 -04:00
|
|
|
|
)
|
|
|
|
|
|
2021-07-01 05:26:24 -04:00
|
|
|
|
self.assertEqual(201, channel.code, msg=channel.json_body)
|
2020-06-01 10:34:33 -04:00
|
|
|
|
self.assertEqual("@bob:test", channel.json_body["name"])
|
|
|
|
|
self.assertEqual("email", channel.json_body["threepids"][0]["medium"])
|
|
|
|
|
self.assertEqual("bob@bob.bob", channel.json_body["threepids"][0]["address"])
|
|
|
|
|
|
|
|
|
|
pushers = self.get_success(
|
|
|
|
|
self.store.get_pushers_by({"user_name": "@bob:test"})
|
|
|
|
|
)
|
|
|
|
|
pushers = list(pushers)
|
|
|
|
|
self.assertEqual(len(pushers), 1)
|
2020-12-16 11:25:30 -05:00
|
|
|
|
self.assertEqual("@bob:test", pushers[0].user_name)
|
2020-06-01 10:34:33 -04:00
|
|
|
|
|
2020-06-05 08:08:49 -04:00
|
|
|
|
@override_config(
|
|
|
|
|
{
|
|
|
|
|
"email": {
|
|
|
|
|
"enable_notifs": False,
|
|
|
|
|
"notif_for_new_users": False,
|
|
|
|
|
"notif_from": "test@example.com",
|
|
|
|
|
},
|
|
|
|
|
"public_baseurl": "https://example.com",
|
|
|
|
|
}
|
|
|
|
|
)
|
2020-06-01 10:34:33 -04:00
|
|
|
|
def test_create_user_email_no_notif_for_new_users(self):
|
|
|
|
|
"""
|
|
|
|
|
Check that a new regular user is created successfully and
|
|
|
|
|
got not an email pusher.
|
|
|
|
|
"""
|
|
|
|
|
url = "/_synapse/admin/v2/users/@bob:test"
|
|
|
|
|
|
|
|
|
|
# Create user
|
2021-07-01 05:26:24 -04:00
|
|
|
|
body = {
|
|
|
|
|
"password": "abc123",
|
|
|
|
|
"threepids": [{"medium": "email", "address": "bob@bob.bob"}],
|
|
|
|
|
}
|
2020-06-01 10:34:33 -04:00
|
|
|
|
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
2020-06-01 10:34:33 -04:00
|
|
|
|
"PUT",
|
|
|
|
|
url,
|
|
|
|
|
access_token=self.admin_user_tok,
|
2021-07-01 05:26:24 -04:00
|
|
|
|
content=body,
|
2020-06-01 10:34:33 -04:00
|
|
|
|
)
|
|
|
|
|
|
2021-07-01 05:26:24 -04:00
|
|
|
|
self.assertEqual(201, channel.code, msg=channel.json_body)
|
2020-06-01 10:34:33 -04:00
|
|
|
|
self.assertEqual("@bob:test", channel.json_body["name"])
|
|
|
|
|
self.assertEqual("email", channel.json_body["threepids"][0]["medium"])
|
|
|
|
|
self.assertEqual("bob@bob.bob", channel.json_body["threepids"][0]["address"])
|
|
|
|
|
|
|
|
|
|
pushers = self.get_success(
|
|
|
|
|
self.store.get_pushers_by({"user_name": "@bob:test"})
|
|
|
|
|
)
|
|
|
|
|
pushers = list(pushers)
|
|
|
|
|
self.assertEqual(len(pushers), 0)
|
|
|
|
|
|
2020-02-28 04:58:05 -05:00
|
|
|
|
def test_set_password(self):
|
|
|
|
|
"""
|
|
|
|
|
Test setting a new password for another user.
|
|
|
|
|
"""
|
2020-01-09 08:31:00 -05:00
|
|
|
|
|
2020-01-20 12:23:59 -05:00
|
|
|
|
# Change password
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
2020-01-20 12:23:59 -05:00
|
|
|
|
"PUT",
|
2020-02-28 04:58:05 -05:00
|
|
|
|
self.url_other_user,
|
2020-01-20 12:23:59 -05:00
|
|
|
|
access_token=self.admin_user_tok,
|
2021-07-01 05:26:24 -04:00
|
|
|
|
content={"password": "hahaha"},
|
2020-01-20 12:23:59 -05:00
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-07-01 05:26:24 -04:00
|
|
|
|
self._check_fields(channel.json_body)
|
2020-01-20 12:23:59 -05:00
|
|
|
|
|
2020-02-28 04:58:05 -05:00
|
|
|
|
def test_set_displayname(self):
|
|
|
|
|
"""
|
|
|
|
|
Test setting the displayname of another user.
|
|
|
|
|
"""
|
|
|
|
|
|
2020-01-09 08:31:00 -05:00
|
|
|
|
# Modify user
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
2020-02-28 04:58:05 -05:00
|
|
|
|
"PUT",
|
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
2021-07-01 05:26:24 -04:00
|
|
|
|
content={"displayname": "foobar"},
|
2020-02-28 04:58:05 -05:00
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-02-28 04:58:05 -05:00
|
|
|
|
self.assertEqual("@user:test", channel.json_body["name"])
|
|
|
|
|
self.assertEqual("foobar", channel.json_body["displayname"])
|
|
|
|
|
|
|
|
|
|
# Get user
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
2020-02-28 04:58:05 -05:00
|
|
|
|
"GET",
|
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-02-28 04:58:05 -05:00
|
|
|
|
self.assertEqual("@user:test", channel.json_body["name"])
|
|
|
|
|
self.assertEqual("foobar", channel.json_body["displayname"])
|
|
|
|
|
|
|
|
|
|
def test_set_threepid(self):
|
|
|
|
|
"""
|
|
|
|
|
Test setting threepid for an other user.
|
|
|
|
|
"""
|
|
|
|
|
|
2021-08-19 05:25:05 -04:00
|
|
|
|
# Add two threepids to user
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
2020-01-09 08:31:00 -05:00
|
|
|
|
"PUT",
|
2020-02-28 04:58:05 -05:00
|
|
|
|
self.url_other_user,
|
2020-01-09 08:31:00 -05:00
|
|
|
|
access_token=self.admin_user_tok,
|
2021-08-19 05:25:05 -04:00
|
|
|
|
content={
|
|
|
|
|
"threepids": [
|
|
|
|
|
{"medium": "email", "address": "bob1@bob.bob"},
|
|
|
|
|
{"medium": "email", "address": "bob2@bob.bob"},
|
|
|
|
|
],
|
|
|
|
|
},
|
2020-01-09 08:31:00 -05:00
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-02-28 04:58:05 -05:00
|
|
|
|
self.assertEqual("@user:test", channel.json_body["name"])
|
2021-08-19 05:25:05 -04:00
|
|
|
|
self.assertEqual(2, len(channel.json_body["threepids"]))
|
|
|
|
|
# result does not always have the same sort order, therefore it becomes sorted
|
|
|
|
|
sorted_result = sorted(
|
|
|
|
|
channel.json_body["threepids"], key=lambda k: k["address"]
|
|
|
|
|
)
|
|
|
|
|
self.assertEqual("email", sorted_result[0]["medium"])
|
|
|
|
|
self.assertEqual("bob1@bob.bob", sorted_result[0]["address"])
|
|
|
|
|
self.assertEqual("email", sorted_result[1]["medium"])
|
|
|
|
|
self.assertEqual("bob2@bob.bob", sorted_result[1]["address"])
|
|
|
|
|
self._check_fields(channel.json_body)
|
|
|
|
|
|
|
|
|
|
# Set a new and remove a threepid
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"PUT",
|
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
content={
|
|
|
|
|
"threepids": [
|
|
|
|
|
{"medium": "email", "address": "bob2@bob.bob"},
|
|
|
|
|
{"medium": "email", "address": "bob3@bob.bob"},
|
|
|
|
|
],
|
|
|
|
|
},
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-08-19 05:25:05 -04:00
|
|
|
|
self.assertEqual("@user:test", channel.json_body["name"])
|
|
|
|
|
self.assertEqual(2, len(channel.json_body["threepids"]))
|
2020-02-28 04:58:05 -05:00
|
|
|
|
self.assertEqual("email", channel.json_body["threepids"][0]["medium"])
|
2021-08-19 05:25:05 -04:00
|
|
|
|
self.assertEqual("bob2@bob.bob", channel.json_body["threepids"][0]["address"])
|
|
|
|
|
self.assertEqual("email", channel.json_body["threepids"][1]["medium"])
|
|
|
|
|
self.assertEqual("bob3@bob.bob", channel.json_body["threepids"][1]["address"])
|
|
|
|
|
self._check_fields(channel.json_body)
|
2020-02-28 04:58:05 -05:00
|
|
|
|
|
|
|
|
|
# Get user
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
2020-02-28 04:58:05 -05:00
|
|
|
|
"GET",
|
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-02-28 04:58:05 -05:00
|
|
|
|
self.assertEqual("@user:test", channel.json_body["name"])
|
2021-08-19 05:25:05 -04:00
|
|
|
|
self.assertEqual(2, len(channel.json_body["threepids"]))
|
2020-02-28 04:58:05 -05:00
|
|
|
|
self.assertEqual("email", channel.json_body["threepids"][0]["medium"])
|
2021-08-19 05:25:05 -04:00
|
|
|
|
self.assertEqual("bob2@bob.bob", channel.json_body["threepids"][0]["address"])
|
|
|
|
|
self.assertEqual("email", channel.json_body["threepids"][1]["medium"])
|
|
|
|
|
self.assertEqual("bob3@bob.bob", channel.json_body["threepids"][1]["address"])
|
|
|
|
|
self._check_fields(channel.json_body)
|
|
|
|
|
|
|
|
|
|
# Remove threepids
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"PUT",
|
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
content={"threepids": []},
|
|
|
|
|
)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-08-19 05:25:05 -04:00
|
|
|
|
self.assertEqual("@user:test", channel.json_body["name"])
|
|
|
|
|
self.assertEqual(0, len(channel.json_body["threepids"]))
|
|
|
|
|
self._check_fields(channel.json_body)
|
2020-02-28 04:58:05 -05:00
|
|
|
|
|
2021-10-21 04:52:32 -04:00
|
|
|
|
def test_set_duplicate_threepid(self):
|
|
|
|
|
"""
|
|
|
|
|
Test setting the same threepid for a second user.
|
|
|
|
|
First user loses and second user gets mapping of this threepid.
|
|
|
|
|
"""
|
|
|
|
|
|
|
|
|
|
# create a user to set a threepid
|
|
|
|
|
first_user = self.register_user("first_user", "pass")
|
|
|
|
|
url_first_user = self.url_prefix % first_user
|
|
|
|
|
|
|
|
|
|
# Add threepid to first user
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"PUT",
|
|
|
|
|
url_first_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
content={
|
|
|
|
|
"threepids": [
|
|
|
|
|
{"medium": "email", "address": "bob1@bob.bob"},
|
|
|
|
|
],
|
|
|
|
|
},
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-10-21 04:52:32 -04:00
|
|
|
|
self.assertEqual(first_user, channel.json_body["name"])
|
|
|
|
|
self.assertEqual(1, len(channel.json_body["threepids"]))
|
|
|
|
|
self.assertEqual("email", channel.json_body["threepids"][0]["medium"])
|
|
|
|
|
self.assertEqual("bob1@bob.bob", channel.json_body["threepids"][0]["address"])
|
|
|
|
|
self._check_fields(channel.json_body)
|
|
|
|
|
|
|
|
|
|
# Add threepids to other user
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"PUT",
|
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
content={
|
|
|
|
|
"threepids": [
|
|
|
|
|
{"medium": "email", "address": "bob2@bob.bob"},
|
|
|
|
|
],
|
|
|
|
|
},
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-10-21 04:52:32 -04:00
|
|
|
|
self.assertEqual("@user:test", channel.json_body["name"])
|
|
|
|
|
self.assertEqual(1, len(channel.json_body["threepids"]))
|
|
|
|
|
self.assertEqual("email", channel.json_body["threepids"][0]["medium"])
|
|
|
|
|
self.assertEqual("bob2@bob.bob", channel.json_body["threepids"][0]["address"])
|
|
|
|
|
self._check_fields(channel.json_body)
|
|
|
|
|
|
|
|
|
|
# Add two new threepids to other user
|
|
|
|
|
# one is used by first_user
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"PUT",
|
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
content={
|
|
|
|
|
"threepids": [
|
|
|
|
|
{"medium": "email", "address": "bob1@bob.bob"},
|
|
|
|
|
{"medium": "email", "address": "bob3@bob.bob"},
|
|
|
|
|
],
|
|
|
|
|
},
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
# other user has this two threepids
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-10-21 04:52:32 -04:00
|
|
|
|
self.assertEqual("@user:test", channel.json_body["name"])
|
|
|
|
|
self.assertEqual(2, len(channel.json_body["threepids"]))
|
|
|
|
|
# result does not always have the same sort order, therefore it becomes sorted
|
|
|
|
|
sorted_result = sorted(
|
|
|
|
|
channel.json_body["threepids"], key=lambda k: k["address"]
|
|
|
|
|
)
|
|
|
|
|
self.assertEqual("email", sorted_result[0]["medium"])
|
|
|
|
|
self.assertEqual("bob1@bob.bob", sorted_result[0]["address"])
|
|
|
|
|
self.assertEqual("email", sorted_result[1]["medium"])
|
|
|
|
|
self.assertEqual("bob3@bob.bob", sorted_result[1]["address"])
|
|
|
|
|
self._check_fields(channel.json_body)
|
|
|
|
|
|
|
|
|
|
# first_user has no threepid anymore
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
url_first_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-10-21 04:52:32 -04:00
|
|
|
|
self.assertEqual(first_user, channel.json_body["name"])
|
|
|
|
|
self.assertEqual(0, len(channel.json_body["threepids"]))
|
|
|
|
|
self._check_fields(channel.json_body)
|
|
|
|
|
|
2021-08-17 06:56:11 -04:00
|
|
|
|
def test_set_external_id(self):
|
|
|
|
|
"""
|
|
|
|
|
Test setting external id for an other user.
|
|
|
|
|
"""
|
|
|
|
|
|
|
|
|
|
# Add two external_ids
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"PUT",
|
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
content={
|
|
|
|
|
"external_ids": [
|
|
|
|
|
{
|
|
|
|
|
"external_id": "external_id1",
|
|
|
|
|
"auth_provider": "auth_provider1",
|
|
|
|
|
},
|
|
|
|
|
{
|
|
|
|
|
"external_id": "external_id2",
|
|
|
|
|
"auth_provider": "auth_provider2",
|
|
|
|
|
},
|
|
|
|
|
]
|
|
|
|
|
},
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-08-17 06:56:11 -04:00
|
|
|
|
self.assertEqual("@user:test", channel.json_body["name"])
|
|
|
|
|
self.assertEqual(2, len(channel.json_body["external_ids"]))
|
|
|
|
|
# result does not always have the same sort order, therefore it becomes sorted
|
|
|
|
|
self.assertEqual(
|
|
|
|
|
sorted(channel.json_body["external_ids"], key=lambda k: k["auth_provider"]),
|
|
|
|
|
[
|
|
|
|
|
{"auth_provider": "auth_provider1", "external_id": "external_id1"},
|
|
|
|
|
{"auth_provider": "auth_provider2", "external_id": "external_id2"},
|
|
|
|
|
],
|
|
|
|
|
)
|
|
|
|
|
self._check_fields(channel.json_body)
|
|
|
|
|
|
|
|
|
|
# Set a new and remove an external_id
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"PUT",
|
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
content={
|
|
|
|
|
"external_ids": [
|
|
|
|
|
{
|
|
|
|
|
"external_id": "external_id2",
|
|
|
|
|
"auth_provider": "auth_provider2",
|
|
|
|
|
},
|
|
|
|
|
{
|
|
|
|
|
"external_id": "external_id3",
|
|
|
|
|
"auth_provider": "auth_provider3",
|
|
|
|
|
},
|
|
|
|
|
]
|
|
|
|
|
},
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-08-17 06:56:11 -04:00
|
|
|
|
self.assertEqual("@user:test", channel.json_body["name"])
|
|
|
|
|
self.assertEqual(2, len(channel.json_body["external_ids"]))
|
|
|
|
|
self.assertEqual(
|
|
|
|
|
channel.json_body["external_ids"],
|
|
|
|
|
[
|
|
|
|
|
{"auth_provider": "auth_provider2", "external_id": "external_id2"},
|
|
|
|
|
{"auth_provider": "auth_provider3", "external_id": "external_id3"},
|
|
|
|
|
],
|
|
|
|
|
)
|
|
|
|
|
self._check_fields(channel.json_body)
|
|
|
|
|
|
|
|
|
|
# Get user
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-08-17 06:56:11 -04:00
|
|
|
|
self.assertEqual("@user:test", channel.json_body["name"])
|
2021-08-19 05:25:05 -04:00
|
|
|
|
self.assertEqual(2, len(channel.json_body["external_ids"]))
|
2021-08-17 06:56:11 -04:00
|
|
|
|
self.assertEqual(
|
|
|
|
|
channel.json_body["external_ids"],
|
|
|
|
|
[
|
|
|
|
|
{"auth_provider": "auth_provider2", "external_id": "external_id2"},
|
|
|
|
|
{"auth_provider": "auth_provider3", "external_id": "external_id3"},
|
|
|
|
|
],
|
|
|
|
|
)
|
|
|
|
|
self._check_fields(channel.json_body)
|
|
|
|
|
|
|
|
|
|
# Remove external_ids
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"PUT",
|
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
content={"external_ids": []},
|
|
|
|
|
)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-08-17 06:56:11 -04:00
|
|
|
|
self.assertEqual("@user:test", channel.json_body["name"])
|
|
|
|
|
self.assertEqual(0, len(channel.json_body["external_ids"]))
|
|
|
|
|
|
2021-10-21 04:52:32 -04:00
|
|
|
|
def test_set_duplicate_external_id(self):
|
|
|
|
|
"""
|
|
|
|
|
Test that setting the same external id for a second user fails and
|
|
|
|
|
external id from user must not be changed.
|
|
|
|
|
"""
|
|
|
|
|
|
|
|
|
|
# create a user to use an external id
|
|
|
|
|
first_user = self.register_user("first_user", "pass")
|
|
|
|
|
url_first_user = self.url_prefix % first_user
|
|
|
|
|
|
|
|
|
|
# Add an external id to first user
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"PUT",
|
|
|
|
|
url_first_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
content={
|
|
|
|
|
"external_ids": [
|
|
|
|
|
{
|
|
|
|
|
"external_id": "external_id1",
|
|
|
|
|
"auth_provider": "auth_provider",
|
|
|
|
|
},
|
|
|
|
|
],
|
|
|
|
|
},
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-10-21 04:52:32 -04:00
|
|
|
|
self.assertEqual(first_user, channel.json_body["name"])
|
|
|
|
|
self.assertEqual(1, len(channel.json_body["external_ids"]))
|
|
|
|
|
self.assertEqual(
|
|
|
|
|
"external_id1", channel.json_body["external_ids"][0]["external_id"]
|
|
|
|
|
)
|
|
|
|
|
self.assertEqual(
|
|
|
|
|
"auth_provider", channel.json_body["external_ids"][0]["auth_provider"]
|
|
|
|
|
)
|
|
|
|
|
self._check_fields(channel.json_body)
|
|
|
|
|
|
|
|
|
|
# Add an external id to other user
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"PUT",
|
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
content={
|
|
|
|
|
"external_ids": [
|
|
|
|
|
{
|
|
|
|
|
"external_id": "external_id2",
|
|
|
|
|
"auth_provider": "auth_provider",
|
|
|
|
|
},
|
|
|
|
|
],
|
|
|
|
|
},
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-10-21 04:52:32 -04:00
|
|
|
|
self.assertEqual("@user:test", channel.json_body["name"])
|
|
|
|
|
self.assertEqual(1, len(channel.json_body["external_ids"]))
|
|
|
|
|
self.assertEqual(
|
|
|
|
|
"external_id2", channel.json_body["external_ids"][0]["external_id"]
|
|
|
|
|
)
|
|
|
|
|
self.assertEqual(
|
|
|
|
|
"auth_provider", channel.json_body["external_ids"][0]["auth_provider"]
|
|
|
|
|
)
|
|
|
|
|
self._check_fields(channel.json_body)
|
|
|
|
|
|
|
|
|
|
# Add two new external_ids to other user
|
|
|
|
|
# one is used by first
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"PUT",
|
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
content={
|
|
|
|
|
"external_ids": [
|
|
|
|
|
{
|
|
|
|
|
"external_id": "external_id1",
|
|
|
|
|
"auth_provider": "auth_provider",
|
|
|
|
|
},
|
|
|
|
|
{
|
|
|
|
|
"external_id": "external_id3",
|
|
|
|
|
"auth_provider": "auth_provider",
|
|
|
|
|
},
|
|
|
|
|
],
|
|
|
|
|
},
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
# must fail
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.CONFLICT, channel.code, msg=channel.json_body)
|
2021-10-21 04:52:32 -04:00
|
|
|
|
self.assertEqual(Codes.UNKNOWN, channel.json_body["errcode"])
|
|
|
|
|
self.assertEqual("External id is already in use.", channel.json_body["error"])
|
|
|
|
|
|
|
|
|
|
# other user must not changed
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-10-21 04:52:32 -04:00
|
|
|
|
self.assertEqual("@user:test", channel.json_body["name"])
|
|
|
|
|
self.assertEqual(1, len(channel.json_body["external_ids"]))
|
|
|
|
|
self.assertEqual(
|
|
|
|
|
"external_id2", channel.json_body["external_ids"][0]["external_id"]
|
|
|
|
|
)
|
|
|
|
|
self.assertEqual(
|
|
|
|
|
"auth_provider", channel.json_body["external_ids"][0]["auth_provider"]
|
|
|
|
|
)
|
|
|
|
|
self._check_fields(channel.json_body)
|
|
|
|
|
|
|
|
|
|
# first user must not changed
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
url_first_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-10-21 04:52:32 -04:00
|
|
|
|
self.assertEqual(first_user, channel.json_body["name"])
|
|
|
|
|
self.assertEqual(1, len(channel.json_body["external_ids"]))
|
|
|
|
|
self.assertEqual(
|
|
|
|
|
"external_id1", channel.json_body["external_ids"][0]["external_id"]
|
|
|
|
|
)
|
|
|
|
|
self.assertEqual(
|
|
|
|
|
"auth_provider", channel.json_body["external_ids"][0]["auth_provider"]
|
|
|
|
|
)
|
|
|
|
|
self._check_fields(channel.json_body)
|
|
|
|
|
|
2020-02-28 04:58:05 -05:00
|
|
|
|
def test_deactivate_user(self):
|
|
|
|
|
"""
|
|
|
|
|
Test deactivating another user.
|
|
|
|
|
"""
|
|
|
|
|
|
2021-01-12 16:30:15 -05:00
|
|
|
|
# set attributes for user
|
|
|
|
|
self.get_success(
|
|
|
|
|
self.store.set_profile_avatar_url("user", "mxc://servername/mediaid")
|
|
|
|
|
)
|
|
|
|
|
self.get_success(
|
|
|
|
|
self.store.user_add_threepid("@user:test", "email", "foo@bar.com", 0, 0)
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
# Get user
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-01-12 16:30:15 -05:00
|
|
|
|
self.assertEqual("@user:test", channel.json_body["name"])
|
2021-03-18 12:54:08 -04:00
|
|
|
|
self.assertFalse(channel.json_body["deactivated"])
|
2021-01-12 16:30:15 -05:00
|
|
|
|
self.assertEqual("foo@bar.com", channel.json_body["threepids"][0]["address"])
|
|
|
|
|
self.assertEqual("mxc://servername/mediaid", channel.json_body["avatar_url"])
|
|
|
|
|
self.assertEqual("User", channel.json_body["displayname"])
|
|
|
|
|
|
2020-02-28 04:58:05 -05:00
|
|
|
|
# Deactivate user
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
2020-02-28 04:58:05 -05:00
|
|
|
|
"PUT",
|
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
2021-03-18 12:54:08 -04:00
|
|
|
|
content={"deactivated": True},
|
2020-02-28 04:58:05 -05:00
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-02-28 04:58:05 -05:00
|
|
|
|
self.assertEqual("@user:test", channel.json_body["name"])
|
2021-03-18 12:54:08 -04:00
|
|
|
|
self.assertTrue(channel.json_body["deactivated"])
|
|
|
|
|
self.assertIsNone(channel.json_body["password_hash"])
|
2021-01-12 16:30:15 -05:00
|
|
|
|
self.assertEqual(0, len(channel.json_body["threepids"]))
|
|
|
|
|
self.assertEqual("mxc://servername/mediaid", channel.json_body["avatar_url"])
|
|
|
|
|
self.assertEqual("User", channel.json_body["displayname"])
|
2020-02-07 05:29:36 -05:00
|
|
|
|
# the user is deactivated, the threepid will be deleted
|
2020-01-09 08:31:00 -05:00
|
|
|
|
|
|
|
|
|
# Get user
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
2020-02-28 04:58:05 -05:00
|
|
|
|
"GET",
|
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
2020-01-09 08:31:00 -05:00
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-02-28 04:58:05 -05:00
|
|
|
|
self.assertEqual("@user:test", channel.json_body["name"])
|
2021-03-18 12:54:08 -04:00
|
|
|
|
self.assertTrue(channel.json_body["deactivated"])
|
|
|
|
|
self.assertIsNone(channel.json_body["password_hash"])
|
2021-01-12 16:30:15 -05:00
|
|
|
|
self.assertEqual(0, len(channel.json_body["threepids"]))
|
|
|
|
|
self.assertEqual("mxc://servername/mediaid", channel.json_body["avatar_url"])
|
|
|
|
|
self.assertEqual("User", channel.json_body["displayname"])
|
2020-02-28 04:58:05 -05:00
|
|
|
|
|
2020-12-17 07:05:39 -05:00
|
|
|
|
@override_config({"user_directory": {"enabled": True, "search_all_users": True}})
|
|
|
|
|
def test_change_name_deactivate_user_user_directory(self):
|
|
|
|
|
"""
|
|
|
|
|
Test change profile information of a deactivated user and
|
|
|
|
|
check that it does not appear in user directory
|
|
|
|
|
"""
|
|
|
|
|
|
|
|
|
|
# is in user directory
|
|
|
|
|
profile = self.get_success(self.store.get_user_in_directory(self.other_user))
|
|
|
|
|
self.assertTrue(profile["display_name"] == "User")
|
|
|
|
|
|
|
|
|
|
# Deactivate user
|
2020-12-17 10:46:40 -05:00
|
|
|
|
channel = self.make_request(
|
2020-12-17 07:05:39 -05:00
|
|
|
|
"PUT",
|
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
2021-03-18 12:54:08 -04:00
|
|
|
|
content={"deactivated": True},
|
2020-12-17 07:05:39 -05:00
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-12-17 07:05:39 -05:00
|
|
|
|
self.assertEqual("@user:test", channel.json_body["name"])
|
2021-03-18 12:54:08 -04:00
|
|
|
|
self.assertTrue(channel.json_body["deactivated"])
|
2020-12-17 07:05:39 -05:00
|
|
|
|
|
|
|
|
|
# is not in user directory
|
|
|
|
|
profile = self.get_success(self.store.get_user_in_directory(self.other_user))
|
2021-03-18 12:54:08 -04:00
|
|
|
|
self.assertIsNone(profile)
|
2020-12-17 07:05:39 -05:00
|
|
|
|
|
|
|
|
|
# Set new displayname user
|
2020-12-17 10:46:40 -05:00
|
|
|
|
channel = self.make_request(
|
2020-12-17 07:05:39 -05:00
|
|
|
|
"PUT",
|
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
2021-03-18 12:54:08 -04:00
|
|
|
|
content={"displayname": "Foobar"},
|
2020-12-17 07:05:39 -05:00
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-12-17 07:05:39 -05:00
|
|
|
|
self.assertEqual("@user:test", channel.json_body["name"])
|
2021-03-18 12:54:08 -04:00
|
|
|
|
self.assertTrue(channel.json_body["deactivated"])
|
2020-12-17 07:05:39 -05:00
|
|
|
|
self.assertEqual("Foobar", channel.json_body["displayname"])
|
|
|
|
|
|
|
|
|
|
# is not in user directory
|
|
|
|
|
profile = self.get_success(self.store.get_user_in_directory(self.other_user))
|
2021-03-18 12:54:08 -04:00
|
|
|
|
self.assertIsNone(profile)
|
2020-12-17 07:05:39 -05:00
|
|
|
|
|
2020-07-15 11:00:21 -04:00
|
|
|
|
def test_reactivate_user(self):
|
|
|
|
|
"""
|
|
|
|
|
Test reactivating another user.
|
|
|
|
|
"""
|
|
|
|
|
|
|
|
|
|
# Deactivate the user.
|
2021-03-18 12:54:08 -04:00
|
|
|
|
self._deactivate_user("@user:test")
|
|
|
|
|
|
|
|
|
|
# Attempt to reactivate the user (without a password).
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"PUT",
|
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
content={"deactivated": False},
|
|
|
|
|
)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2021-03-18 12:54:08 -04:00
|
|
|
|
|
|
|
|
|
# Reactivate the user.
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
2020-07-15 11:00:21 -04:00
|
|
|
|
"PUT",
|
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
2021-03-18 12:54:08 -04:00
|
|
|
|
content={"deactivated": False, "password": "foo"},
|
2020-07-15 11:00:21 -04:00
|
|
|
|
)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-03-18 12:54:08 -04:00
|
|
|
|
self.assertEqual("@user:test", channel.json_body["name"])
|
|
|
|
|
self.assertFalse(channel.json_body["deactivated"])
|
|
|
|
|
self.assertIsNotNone(channel.json_body["password_hash"])
|
2020-09-22 13:19:01 -04:00
|
|
|
|
self._is_erased("@user:test", False)
|
2020-07-15 11:00:21 -04:00
|
|
|
|
|
2021-03-18 12:54:08 -04:00
|
|
|
|
@override_config({"password_config": {"localdb_enabled": False}})
|
|
|
|
|
def test_reactivate_user_localdb_disabled(self):
|
|
|
|
|
"""
|
|
|
|
|
Test reactivating another user when using SSO.
|
|
|
|
|
"""
|
|
|
|
|
|
|
|
|
|
# Deactivate the user.
|
|
|
|
|
self._deactivate_user("@user:test")
|
|
|
|
|
|
|
|
|
|
# Reactivate the user with a password
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
2020-07-15 11:00:21 -04:00
|
|
|
|
"PUT",
|
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
2021-03-18 12:54:08 -04:00
|
|
|
|
content={"deactivated": False, "password": "foo"},
|
2020-07-15 11:00:21 -04:00
|
|
|
|
)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.FORBIDDEN, channel.code, msg=channel.json_body)
|
2021-03-18 12:54:08 -04:00
|
|
|
|
self.assertEqual(Codes.FORBIDDEN, channel.json_body["errcode"])
|
2020-07-15 11:00:21 -04:00
|
|
|
|
|
2021-03-18 12:54:08 -04:00
|
|
|
|
# Reactivate the user without a password.
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
2020-07-15 11:00:21 -04:00
|
|
|
|
"PUT",
|
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
2021-03-18 12:54:08 -04:00
|
|
|
|
content={"deactivated": False},
|
2020-07-15 11:00:21 -04:00
|
|
|
|
)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-03-18 12:54:08 -04:00
|
|
|
|
self.assertEqual("@user:test", channel.json_body["name"])
|
|
|
|
|
self.assertFalse(channel.json_body["deactivated"])
|
|
|
|
|
self.assertIsNone(channel.json_body["password_hash"])
|
|
|
|
|
self._is_erased("@user:test", False)
|
2020-07-15 11:00:21 -04:00
|
|
|
|
|
2021-03-18 12:54:08 -04:00
|
|
|
|
@override_config({"password_config": {"enabled": False}})
|
|
|
|
|
def test_reactivate_user_password_disabled(self):
|
|
|
|
|
"""
|
|
|
|
|
Test reactivating another user when using SSO.
|
|
|
|
|
"""
|
|
|
|
|
|
|
|
|
|
# Deactivate the user.
|
|
|
|
|
self._deactivate_user("@user:test")
|
|
|
|
|
|
|
|
|
|
# Reactivate the user with a password
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
2021-03-18 12:54:08 -04:00
|
|
|
|
"PUT",
|
2020-07-15 11:00:21 -04:00
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
2021-03-18 12:54:08 -04:00
|
|
|
|
content={"deactivated": False, "password": "foo"},
|
2020-07-15 11:00:21 -04:00
|
|
|
|
)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.FORBIDDEN, channel.code, msg=channel.json_body)
|
2021-03-18 12:54:08 -04:00
|
|
|
|
self.assertEqual(Codes.FORBIDDEN, channel.json_body["errcode"])
|
2020-07-15 11:00:21 -04:00
|
|
|
|
|
2021-03-18 12:54:08 -04:00
|
|
|
|
# Reactivate the user without a password.
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"PUT",
|
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
content={"deactivated": False},
|
|
|
|
|
)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-07-15 11:00:21 -04:00
|
|
|
|
self.assertEqual("@user:test", channel.json_body["name"])
|
2021-03-18 12:54:08 -04:00
|
|
|
|
self.assertFalse(channel.json_body["deactivated"])
|
|
|
|
|
self.assertIsNone(channel.json_body["password_hash"])
|
2020-09-22 13:19:01 -04:00
|
|
|
|
self._is_erased("@user:test", False)
|
2020-07-15 11:00:21 -04:00
|
|
|
|
|
2020-02-28 04:58:05 -05:00
|
|
|
|
def test_set_user_as_admin(self):
|
|
|
|
|
"""
|
|
|
|
|
Test setting the admin flag on a user.
|
|
|
|
|
"""
|
|
|
|
|
|
|
|
|
|
# Set a user as an admin
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
2020-02-28 04:58:05 -05:00
|
|
|
|
"PUT",
|
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
2021-03-18 12:54:08 -04:00
|
|
|
|
content={"admin": True},
|
2020-02-28 04:58:05 -05:00
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-02-28 04:58:05 -05:00
|
|
|
|
self.assertEqual("@user:test", channel.json_body["name"])
|
2021-03-18 12:54:08 -04:00
|
|
|
|
self.assertTrue(channel.json_body["admin"])
|
2020-02-28 04:58:05 -05:00
|
|
|
|
|
|
|
|
|
# Get user
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
2020-02-28 04:58:05 -05:00
|
|
|
|
"GET",
|
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-02-28 04:58:05 -05:00
|
|
|
|
self.assertEqual("@user:test", channel.json_body["name"])
|
2021-03-18 12:54:08 -04:00
|
|
|
|
self.assertTrue(channel.json_body["admin"])
|
2020-02-26 07:22:55 -05:00
|
|
|
|
|
2021-10-26 05:01:06 -04:00
|
|
|
|
def test_set_user_type(self):
|
|
|
|
|
"""
|
|
|
|
|
Test changing user type.
|
|
|
|
|
"""
|
|
|
|
|
|
|
|
|
|
# Set to support type
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"PUT",
|
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
content={"user_type": UserTypes.SUPPORT},
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-10-26 05:01:06 -04:00
|
|
|
|
self.assertEqual("@user:test", channel.json_body["name"])
|
|
|
|
|
self.assertEqual(UserTypes.SUPPORT, channel.json_body["user_type"])
|
|
|
|
|
|
|
|
|
|
# Get user
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-10-26 05:01:06 -04:00
|
|
|
|
self.assertEqual("@user:test", channel.json_body["name"])
|
|
|
|
|
self.assertEqual(UserTypes.SUPPORT, channel.json_body["user_type"])
|
|
|
|
|
|
|
|
|
|
# Change back to a regular user
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"PUT",
|
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
content={"user_type": None},
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-10-26 05:01:06 -04:00
|
|
|
|
self.assertEqual("@user:test", channel.json_body["name"])
|
|
|
|
|
self.assertIsNone(channel.json_body["user_type"])
|
|
|
|
|
|
|
|
|
|
# Get user
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
self.url_other_user,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-10-26 05:01:06 -04:00
|
|
|
|
self.assertEqual("@user:test", channel.json_body["name"])
|
|
|
|
|
self.assertIsNone(channel.json_body["user_type"])
|
|
|
|
|
|
2020-02-26 07:22:55 -05:00
|
|
|
|
def test_accidental_deactivation_prevention(self):
|
|
|
|
|
"""
|
|
|
|
|
Ensure an account can't accidentally be deactivated by using a str value
|
|
|
|
|
for the deactivated body parameter
|
|
|
|
|
"""
|
2020-02-28 04:58:05 -05:00
|
|
|
|
url = "/_synapse/admin/v2/users/@bob:test"
|
2020-02-26 07:22:55 -05:00
|
|
|
|
|
|
|
|
|
# Create user
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
2020-02-26 07:22:55 -05:00
|
|
|
|
"PUT",
|
2020-02-28 04:58:05 -05:00
|
|
|
|
url,
|
2020-02-26 07:22:55 -05:00
|
|
|
|
access_token=self.admin_user_tok,
|
2021-03-18 12:54:08 -04:00
|
|
|
|
content={"password": "abc123"},
|
2020-02-26 07:22:55 -05:00
|
|
|
|
)
|
|
|
|
|
|
2021-07-01 05:26:24 -04:00
|
|
|
|
self.assertEqual(201, channel.code, msg=channel.json_body)
|
2020-02-26 07:22:55 -05:00
|
|
|
|
self.assertEqual("@bob:test", channel.json_body["name"])
|
|
|
|
|
self.assertEqual("bob", channel.json_body["displayname"])
|
|
|
|
|
|
|
|
|
|
# Get user
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
url,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
2020-02-26 07:22:55 -05:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-02-26 07:22:55 -05:00
|
|
|
|
self.assertEqual("@bob:test", channel.json_body["name"])
|
|
|
|
|
self.assertEqual("bob", channel.json_body["displayname"])
|
|
|
|
|
self.assertEqual(0, channel.json_body["deactivated"])
|
|
|
|
|
|
|
|
|
|
# Change password (and use a str for deactivate instead of a bool)
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
2020-02-26 07:22:55 -05:00
|
|
|
|
"PUT",
|
2020-02-28 04:58:05 -05:00
|
|
|
|
url,
|
2020-02-26 07:22:55 -05:00
|
|
|
|
access_token=self.admin_user_tok,
|
2021-03-18 12:54:08 -04:00
|
|
|
|
content={"password": "abc123", "deactivated": "false"},
|
2020-02-26 07:22:55 -05:00
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2020-02-26 07:22:55 -05:00
|
|
|
|
|
|
|
|
|
# Check user is not deactivated
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
url,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
2020-02-26 07:22:55 -05:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-02-26 07:22:55 -05:00
|
|
|
|
self.assertEqual("@bob:test", channel.json_body["name"])
|
|
|
|
|
self.assertEqual("bob", channel.json_body["displayname"])
|
|
|
|
|
|
|
|
|
|
# Ensure they're still alive
|
|
|
|
|
self.assertEqual(0, channel.json_body["deactivated"])
|
2020-09-18 10:26:36 -04:00
|
|
|
|
|
2021-03-18 12:54:08 -04:00
|
|
|
|
def _is_erased(self, user_id: str, expect: bool) -> None:
|
2020-09-22 13:19:01 -04:00
|
|
|
|
"""Assert that the user is erased or not"""
|
|
|
|
|
d = self.store.is_user_erased(user_id)
|
|
|
|
|
if expect:
|
|
|
|
|
self.assertTrue(self.get_success(d))
|
|
|
|
|
else:
|
|
|
|
|
self.assertFalse(self.get_success(d))
|
|
|
|
|
|
2021-03-18 12:54:08 -04:00
|
|
|
|
def _deactivate_user(self, user_id: str) -> None:
|
|
|
|
|
"""Deactivate user and set as erased"""
|
|
|
|
|
|
|
|
|
|
# Deactivate the user.
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"PUT",
|
|
|
|
|
"/_synapse/admin/v2/users/%s" % urllib.parse.quote(user_id),
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
content={"deactivated": True},
|
|
|
|
|
)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-03-18 12:54:08 -04:00
|
|
|
|
self.assertTrue(channel.json_body["deactivated"])
|
|
|
|
|
self.assertIsNone(channel.json_body["password_hash"])
|
|
|
|
|
self._is_erased(user_id, False)
|
|
|
|
|
d = self.store.mark_user_erased(user_id)
|
|
|
|
|
self.assertIsNone(self.get_success(d))
|
|
|
|
|
self._is_erased(user_id, True)
|
|
|
|
|
|
2021-07-01 05:26:24 -04:00
|
|
|
|
def _check_fields(self, content: JsonDict):
|
|
|
|
|
"""Checks that the expected user attributes are present in content
|
|
|
|
|
|
|
|
|
|
Args:
|
|
|
|
|
content: Content dictionary to check
|
|
|
|
|
"""
|
|
|
|
|
self.assertIn("displayname", content)
|
|
|
|
|
self.assertIn("threepids", content)
|
|
|
|
|
self.assertIn("avatar_url", content)
|
|
|
|
|
self.assertIn("admin", content)
|
|
|
|
|
self.assertIn("deactivated", content)
|
|
|
|
|
self.assertIn("shadow_banned", content)
|
|
|
|
|
self.assertIn("password_hash", content)
|
|
|
|
|
self.assertIn("creation_ts", content)
|
|
|
|
|
self.assertIn("appservice_id", content)
|
|
|
|
|
self.assertIn("consent_server_notice_sent", content)
|
|
|
|
|
self.assertIn("consent_version", content)
|
|
|
|
|
self.assertIn("external_ids", content)
|
|
|
|
|
|
2020-09-18 10:26:36 -04:00
|
|
|
|
|
|
|
|
|
class UserMembershipRestTestCase(unittest.HomeserverTestCase):
|
|
|
|
|
|
|
|
|
|
servlets = [
|
|
|
|
|
synapse.rest.admin.register_servlets,
|
|
|
|
|
login.register_servlets,
|
|
|
|
|
room.register_servlets,
|
|
|
|
|
]
|
|
|
|
|
|
|
|
|
|
def prepare(self, reactor, clock, hs):
|
|
|
|
|
self.admin_user = self.register_user("admin", "pass", admin=True)
|
|
|
|
|
self.admin_user_tok = self.login("admin", "pass")
|
|
|
|
|
|
|
|
|
|
self.other_user = self.register_user("user", "pass")
|
|
|
|
|
self.url = "/_synapse/admin/v1/users/%s/joined_rooms" % urllib.parse.quote(
|
|
|
|
|
self.other_user
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
def test_no_auth(self):
|
|
|
|
|
"""
|
|
|
|
|
Try to list rooms of an user without authentication.
|
|
|
|
|
"""
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request("GET", self.url, b"{}")
|
2020-09-18 10:26:36 -04:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.UNAUTHORIZED, channel.code, msg=channel.json_body)
|
2020-09-18 10:26:36 -04:00
|
|
|
|
self.assertEqual(Codes.MISSING_TOKEN, channel.json_body["errcode"])
|
|
|
|
|
|
|
|
|
|
def test_requester_is_no_admin(self):
|
|
|
|
|
"""
|
|
|
|
|
If the user is not a server admin, an error is returned.
|
|
|
|
|
"""
|
|
|
|
|
other_user_token = self.login("user", "pass")
|
|
|
|
|
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
self.url,
|
|
|
|
|
access_token=other_user_token,
|
|
|
|
|
)
|
2020-09-18 10:26:36 -04:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.FORBIDDEN, channel.code, msg=channel.json_body)
|
2020-09-18 10:26:36 -04:00
|
|
|
|
self.assertEqual(Codes.FORBIDDEN, channel.json_body["errcode"])
|
|
|
|
|
|
|
|
|
|
def test_user_does_not_exist(self):
|
|
|
|
|
"""
|
2021-01-11 14:32:17 -05:00
|
|
|
|
Tests that a lookup for a user that does not exist returns an empty list
|
2020-09-18 10:26:36 -04:00
|
|
|
|
"""
|
|
|
|
|
url = "/_synapse/admin/v1/users/@unknown_person:test/joined_rooms"
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
url,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
2020-09-18 10:26:36 -04:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-01-11 14:32:17 -05:00
|
|
|
|
self.assertEqual(0, channel.json_body["total"])
|
|
|
|
|
self.assertEqual(0, len(channel.json_body["joined_rooms"]))
|
2020-09-18 10:26:36 -04:00
|
|
|
|
|
|
|
|
|
def test_user_is_not_local(self):
|
|
|
|
|
"""
|
2021-01-11 14:32:17 -05:00
|
|
|
|
Tests that a lookup for a user that is not a local and participates in no conversation returns an empty list
|
2020-09-18 10:26:36 -04:00
|
|
|
|
"""
|
|
|
|
|
url = "/_synapse/admin/v1/users/@unknown_person:unknown_domain/joined_rooms"
|
|
|
|
|
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
url,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
2020-09-18 10:26:36 -04:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-01-11 14:32:17 -05:00
|
|
|
|
self.assertEqual(0, channel.json_body["total"])
|
|
|
|
|
self.assertEqual(0, len(channel.json_body["joined_rooms"]))
|
2020-09-18 10:26:36 -04:00
|
|
|
|
|
2020-10-26 12:25:48 -04:00
|
|
|
|
def test_no_memberships(self):
|
|
|
|
|
"""
|
|
|
|
|
Tests that a normal lookup for rooms is successfully
|
|
|
|
|
if user has no memberships
|
|
|
|
|
"""
|
|
|
|
|
# Get rooms
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
self.url,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
2020-10-26 12:25:48 -04:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-10-26 12:25:48 -04:00
|
|
|
|
self.assertEqual(0, channel.json_body["total"])
|
|
|
|
|
self.assertEqual(0, len(channel.json_body["joined_rooms"]))
|
|
|
|
|
|
2020-09-18 10:26:36 -04:00
|
|
|
|
def test_get_rooms(self):
|
|
|
|
|
"""
|
|
|
|
|
Tests that a normal lookup for rooms is successfully
|
|
|
|
|
"""
|
|
|
|
|
# Create rooms and join
|
|
|
|
|
other_user_tok = self.login("user", "pass")
|
|
|
|
|
number_rooms = 5
|
2021-04-20 06:50:49 -04:00
|
|
|
|
for _ in range(number_rooms):
|
2020-09-18 10:26:36 -04:00
|
|
|
|
self.helper.create_room_as(self.other_user, tok=other_user_tok)
|
|
|
|
|
|
|
|
|
|
# Get rooms
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
self.url,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
2020-09-18 10:26:36 -04:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-09-18 10:26:36 -04:00
|
|
|
|
self.assertEqual(number_rooms, channel.json_body["total"])
|
|
|
|
|
self.assertEqual(number_rooms, len(channel.json_body["joined_rooms"]))
|
2020-10-27 10:12:31 -04:00
|
|
|
|
|
2021-01-11 14:32:17 -05:00
|
|
|
|
def test_get_rooms_with_nonlocal_user(self):
|
|
|
|
|
"""
|
|
|
|
|
Tests that a normal lookup for rooms is successful with a non-local user
|
|
|
|
|
"""
|
|
|
|
|
|
|
|
|
|
other_user_tok = self.login("user", "pass")
|
|
|
|
|
event_builder_factory = self.hs.get_event_builder_factory()
|
|
|
|
|
event_creation_handler = self.hs.get_event_creation_handler()
|
|
|
|
|
storage = self.hs.get_storage()
|
|
|
|
|
|
|
|
|
|
# Create two rooms, one with a local user only and one with both a local
|
|
|
|
|
# and remote user.
|
|
|
|
|
self.helper.create_room_as(self.other_user, tok=other_user_tok)
|
|
|
|
|
local_and_remote_room_id = self.helper.create_room_as(
|
|
|
|
|
self.other_user, tok=other_user_tok
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
# Add a remote user to the room.
|
|
|
|
|
builder = event_builder_factory.for_room_version(
|
|
|
|
|
RoomVersions.V1,
|
|
|
|
|
{
|
|
|
|
|
"type": "m.room.member",
|
|
|
|
|
"sender": "@joiner:remote_hs",
|
|
|
|
|
"state_key": "@joiner:remote_hs",
|
|
|
|
|
"room_id": local_and_remote_room_id,
|
|
|
|
|
"content": {"membership": "join"},
|
|
|
|
|
},
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
event, context = self.get_success(
|
|
|
|
|
event_creation_handler.create_new_client_event(builder)
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
self.get_success(storage.persistence.persist_event(event, context))
|
|
|
|
|
|
|
|
|
|
# Now get rooms
|
|
|
|
|
url = "/_synapse/admin/v1/users/@joiner:remote_hs/joined_rooms"
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
url,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-01-11 14:32:17 -05:00
|
|
|
|
self.assertEqual(1, channel.json_body["total"])
|
|
|
|
|
self.assertEqual([local_and_remote_room_id], channel.json_body["joined_rooms"])
|
|
|
|
|
|
2020-10-27 10:12:31 -04:00
|
|
|
|
|
2020-10-28 11:02:42 -04:00
|
|
|
|
class PushersRestTestCase(unittest.HomeserverTestCase):
|
|
|
|
|
|
|
|
|
|
servlets = [
|
|
|
|
|
synapse.rest.admin.register_servlets,
|
|
|
|
|
login.register_servlets,
|
|
|
|
|
]
|
|
|
|
|
|
|
|
|
|
def prepare(self, reactor, clock, hs):
|
|
|
|
|
self.store = hs.get_datastore()
|
|
|
|
|
|
|
|
|
|
self.admin_user = self.register_user("admin", "pass", admin=True)
|
|
|
|
|
self.admin_user_tok = self.login("admin", "pass")
|
|
|
|
|
|
|
|
|
|
self.other_user = self.register_user("user", "pass")
|
|
|
|
|
self.url = "/_synapse/admin/v1/users/%s/pushers" % urllib.parse.quote(
|
|
|
|
|
self.other_user
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
def test_no_auth(self):
|
|
|
|
|
"""
|
|
|
|
|
Try to list pushers of an user without authentication.
|
|
|
|
|
"""
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request("GET", self.url, b"{}")
|
2020-10-28 11:02:42 -04:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.UNAUTHORIZED, channel.code, msg=channel.json_body)
|
2020-10-28 11:02:42 -04:00
|
|
|
|
self.assertEqual(Codes.MISSING_TOKEN, channel.json_body["errcode"])
|
|
|
|
|
|
|
|
|
|
def test_requester_is_no_admin(self):
|
|
|
|
|
"""
|
|
|
|
|
If the user is not a server admin, an error is returned.
|
|
|
|
|
"""
|
|
|
|
|
other_user_token = self.login("user", "pass")
|
|
|
|
|
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
self.url,
|
|
|
|
|
access_token=other_user_token,
|
|
|
|
|
)
|
2020-10-28 11:02:42 -04:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.FORBIDDEN, channel.code, msg=channel.json_body)
|
2020-10-28 11:02:42 -04:00
|
|
|
|
self.assertEqual(Codes.FORBIDDEN, channel.json_body["errcode"])
|
|
|
|
|
|
|
|
|
|
def test_user_does_not_exist(self):
|
|
|
|
|
"""
|
2021-11-30 04:53:54 -05:00
|
|
|
|
Tests that a lookup for a user that does not exist returns a HTTPStatus.NOT_FOUND
|
2020-10-28 11:02:42 -04:00
|
|
|
|
"""
|
|
|
|
|
url = "/_synapse/admin/v1/users/@unknown_person:test/pushers"
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
url,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
2020-10-28 11:02:42 -04:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.NOT_FOUND, channel.code, msg=channel.json_body)
|
2020-10-28 11:02:42 -04:00
|
|
|
|
self.assertEqual(Codes.NOT_FOUND, channel.json_body["errcode"])
|
|
|
|
|
|
|
|
|
|
def test_user_is_not_local(self):
|
|
|
|
|
"""
|
2021-11-30 04:53:54 -05:00
|
|
|
|
Tests that a lookup for a user that is not a local returns a HTTPStatus.BAD_REQUEST
|
2020-10-28 11:02:42 -04:00
|
|
|
|
"""
|
|
|
|
|
url = "/_synapse/admin/v1/users/@unknown_person:unknown_domain/pushers"
|
|
|
|
|
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
url,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
2020-10-28 11:02:42 -04:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2021-08-11 15:29:59 -04:00
|
|
|
|
self.assertEqual("Can only look up local users", channel.json_body["error"])
|
2020-10-28 11:02:42 -04:00
|
|
|
|
|
|
|
|
|
def test_get_pushers(self):
|
|
|
|
|
"""
|
|
|
|
|
Tests that a normal lookup for pushers is successfully
|
|
|
|
|
"""
|
|
|
|
|
|
|
|
|
|
# Get pushers
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
self.url,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
2020-10-28 11:02:42 -04:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-10-28 11:02:42 -04:00
|
|
|
|
self.assertEqual(0, channel.json_body["total"])
|
|
|
|
|
|
|
|
|
|
# Register the pusher
|
|
|
|
|
other_user_token = self.login("user", "pass")
|
|
|
|
|
user_tuple = self.get_success(
|
|
|
|
|
self.store.get_user_by_access_token(other_user_token)
|
|
|
|
|
)
|
2020-10-29 14:21:49 -04:00
|
|
|
|
token_id = user_tuple.token_id
|
2020-10-28 11:02:42 -04:00
|
|
|
|
|
|
|
|
|
self.get_success(
|
|
|
|
|
self.hs.get_pusherpool().add_pusher(
|
|
|
|
|
user_id=self.other_user,
|
|
|
|
|
access_token=token_id,
|
|
|
|
|
kind="http",
|
|
|
|
|
app_id="m.http",
|
|
|
|
|
app_display_name="HTTP Push Notifications",
|
|
|
|
|
device_display_name="pushy push",
|
|
|
|
|
pushkey="a@example.com",
|
|
|
|
|
lang=None,
|
2020-12-04 10:51:56 -05:00
|
|
|
|
data={"url": "https://example.com/_matrix/push/v1/notify"},
|
2020-10-28 11:02:42 -04:00
|
|
|
|
)
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
# Get pushers
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
self.url,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
2020-10-28 11:02:42 -04:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-10-28 11:02:42 -04:00
|
|
|
|
self.assertEqual(1, channel.json_body["total"])
|
|
|
|
|
|
|
|
|
|
for p in channel.json_body["pushers"]:
|
|
|
|
|
self.assertIn("pushkey", p)
|
|
|
|
|
self.assertIn("kind", p)
|
|
|
|
|
self.assertIn("app_id", p)
|
|
|
|
|
self.assertIn("app_display_name", p)
|
|
|
|
|
self.assertIn("device_display_name", p)
|
|
|
|
|
self.assertIn("profile_tag", p)
|
|
|
|
|
self.assertIn("lang", p)
|
|
|
|
|
self.assertIn("url", p["data"])
|
|
|
|
|
|
|
|
|
|
|
2020-10-27 10:12:31 -04:00
|
|
|
|
class UserMediaRestTestCase(unittest.HomeserverTestCase):
|
|
|
|
|
|
|
|
|
|
servlets = [
|
|
|
|
|
synapse.rest.admin.register_servlets,
|
|
|
|
|
login.register_servlets,
|
|
|
|
|
]
|
|
|
|
|
|
|
|
|
|
def prepare(self, reactor, clock, hs):
|
2021-02-22 14:38:51 -05:00
|
|
|
|
self.store = hs.get_datastore()
|
2020-10-27 10:12:31 -04:00
|
|
|
|
self.media_repo = hs.get_media_repository_resource()
|
2021-09-24 07:25:21 -04:00
|
|
|
|
self.filepaths = MediaFilePaths(hs.config.media.media_store_path)
|
2020-10-27 10:12:31 -04:00
|
|
|
|
|
|
|
|
|
self.admin_user = self.register_user("admin", "pass", admin=True)
|
|
|
|
|
self.admin_user_tok = self.login("admin", "pass")
|
|
|
|
|
|
|
|
|
|
self.other_user = self.register_user("user", "pass")
|
|
|
|
|
self.url = "/_synapse/admin/v1/users/%s/media" % urllib.parse.quote(
|
|
|
|
|
self.other_user
|
|
|
|
|
)
|
|
|
|
|
|
2021-08-11 15:29:59 -04:00
|
|
|
|
@parameterized.expand(["GET", "DELETE"])
|
|
|
|
|
def test_no_auth(self, method: str):
|
|
|
|
|
"""Try to list media of an user without authentication."""
|
|
|
|
|
channel = self.make_request(method, self.url, {})
|
2020-10-27 10:12:31 -04:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.UNAUTHORIZED, channel.code, msg=channel.json_body)
|
2020-10-27 10:12:31 -04:00
|
|
|
|
self.assertEqual(Codes.MISSING_TOKEN, channel.json_body["errcode"])
|
|
|
|
|
|
2021-08-11 15:29:59 -04:00
|
|
|
|
@parameterized.expand(["GET", "DELETE"])
|
|
|
|
|
def test_requester_is_no_admin(self, method: str):
|
|
|
|
|
"""If the user is not a server admin, an error is returned."""
|
2020-10-27 10:12:31 -04:00
|
|
|
|
other_user_token = self.login("user", "pass")
|
|
|
|
|
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
2021-08-11 15:29:59 -04:00
|
|
|
|
method,
|
2020-12-15 09:44:04 -05:00
|
|
|
|
self.url,
|
|
|
|
|
access_token=other_user_token,
|
|
|
|
|
)
|
2020-10-27 10:12:31 -04:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.FORBIDDEN, channel.code, msg=channel.json_body)
|
2020-10-27 10:12:31 -04:00
|
|
|
|
self.assertEqual(Codes.FORBIDDEN, channel.json_body["errcode"])
|
|
|
|
|
|
2021-08-11 15:29:59 -04:00
|
|
|
|
@parameterized.expand(["GET", "DELETE"])
|
|
|
|
|
def test_user_does_not_exist(self, method: str):
|
2021-11-30 04:53:54 -05:00
|
|
|
|
"""Tests that a lookup for a user that does not exist returns a HTTPStatus.NOT_FOUND"""
|
2020-10-27 10:12:31 -04:00
|
|
|
|
url = "/_synapse/admin/v1/users/@unknown_person:test/media"
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
2021-08-11 15:29:59 -04:00
|
|
|
|
method,
|
2020-12-15 09:44:04 -05:00
|
|
|
|
url,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
2020-10-27 10:12:31 -04:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.NOT_FOUND, channel.code, msg=channel.json_body)
|
2020-10-27 10:12:31 -04:00
|
|
|
|
self.assertEqual(Codes.NOT_FOUND, channel.json_body["errcode"])
|
|
|
|
|
|
2021-08-11 15:29:59 -04:00
|
|
|
|
@parameterized.expand(["GET", "DELETE"])
|
|
|
|
|
def test_user_is_not_local(self, method: str):
|
2021-11-30 04:53:54 -05:00
|
|
|
|
"""Tests that a lookup for a user that is not a local returns a HTTPStatus.BAD_REQUEST"""
|
2020-10-27 10:12:31 -04:00
|
|
|
|
url = "/_synapse/admin/v1/users/@unknown_person:unknown_domain/media"
|
|
|
|
|
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
2021-08-11 15:29:59 -04:00
|
|
|
|
method,
|
2020-12-15 09:44:04 -05:00
|
|
|
|
url,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
2020-10-27 10:12:31 -04:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2021-08-11 15:29:59 -04:00
|
|
|
|
self.assertEqual("Can only look up local users", channel.json_body["error"])
|
2020-10-27 10:12:31 -04:00
|
|
|
|
|
2021-08-11 15:29:59 -04:00
|
|
|
|
def test_limit_GET(self):
|
|
|
|
|
"""Testing list of media with limit"""
|
2020-10-27 10:12:31 -04:00
|
|
|
|
|
|
|
|
|
number_media = 20
|
|
|
|
|
other_user_tok = self.login("user", "pass")
|
2021-02-22 14:38:51 -05:00
|
|
|
|
self._create_media_for_user(other_user_tok, number_media)
|
2020-10-27 10:12:31 -04:00
|
|
|
|
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
2020-10-27 10:12:31 -04:00
|
|
|
|
"GET",
|
|
|
|
|
self.url + "?limit=5",
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-10-27 10:12:31 -04:00
|
|
|
|
self.assertEqual(channel.json_body["total"], number_media)
|
|
|
|
|
self.assertEqual(len(channel.json_body["media"]), 5)
|
|
|
|
|
self.assertEqual(channel.json_body["next_token"], 5)
|
|
|
|
|
self._check_fields(channel.json_body["media"])
|
|
|
|
|
|
2021-08-11 15:29:59 -04:00
|
|
|
|
def test_limit_DELETE(self):
|
|
|
|
|
"""Testing delete of media with limit"""
|
|
|
|
|
|
|
|
|
|
number_media = 20
|
|
|
|
|
other_user_tok = self.login("user", "pass")
|
|
|
|
|
self._create_media_for_user(other_user_tok, number_media)
|
|
|
|
|
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"DELETE",
|
|
|
|
|
self.url + "?limit=5",
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-08-11 15:29:59 -04:00
|
|
|
|
self.assertEqual(channel.json_body["total"], 5)
|
|
|
|
|
self.assertEqual(len(channel.json_body["deleted_media"]), 5)
|
|
|
|
|
|
|
|
|
|
def test_from_GET(self):
|
|
|
|
|
"""Testing list of media with a defined starting point (from)"""
|
2020-10-27 10:12:31 -04:00
|
|
|
|
|
|
|
|
|
number_media = 20
|
|
|
|
|
other_user_tok = self.login("user", "pass")
|
2021-02-22 14:38:51 -05:00
|
|
|
|
self._create_media_for_user(other_user_tok, number_media)
|
2020-10-27 10:12:31 -04:00
|
|
|
|
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
2020-10-27 10:12:31 -04:00
|
|
|
|
"GET",
|
|
|
|
|
self.url + "?from=5",
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-10-27 10:12:31 -04:00
|
|
|
|
self.assertEqual(channel.json_body["total"], number_media)
|
|
|
|
|
self.assertEqual(len(channel.json_body["media"]), 15)
|
|
|
|
|
self.assertNotIn("next_token", channel.json_body)
|
|
|
|
|
self._check_fields(channel.json_body["media"])
|
|
|
|
|
|
2021-08-11 15:29:59 -04:00
|
|
|
|
def test_from_DELETE(self):
|
|
|
|
|
"""Testing delete of media with a defined starting point (from)"""
|
|
|
|
|
|
|
|
|
|
number_media = 20
|
|
|
|
|
other_user_tok = self.login("user", "pass")
|
|
|
|
|
self._create_media_for_user(other_user_tok, number_media)
|
|
|
|
|
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"DELETE",
|
|
|
|
|
self.url + "?from=5",
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-08-11 15:29:59 -04:00
|
|
|
|
self.assertEqual(channel.json_body["total"], 15)
|
|
|
|
|
self.assertEqual(len(channel.json_body["deleted_media"]), 15)
|
|
|
|
|
|
|
|
|
|
def test_limit_and_from_GET(self):
|
|
|
|
|
"""Testing list of media with a defined starting point and limit"""
|
2020-10-27 10:12:31 -04:00
|
|
|
|
|
|
|
|
|
number_media = 20
|
|
|
|
|
other_user_tok = self.login("user", "pass")
|
2021-02-22 14:38:51 -05:00
|
|
|
|
self._create_media_for_user(other_user_tok, number_media)
|
2020-10-27 10:12:31 -04:00
|
|
|
|
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
2020-10-27 10:12:31 -04:00
|
|
|
|
"GET",
|
|
|
|
|
self.url + "?from=5&limit=10",
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-10-27 10:12:31 -04:00
|
|
|
|
self.assertEqual(channel.json_body["total"], number_media)
|
|
|
|
|
self.assertEqual(channel.json_body["next_token"], 15)
|
|
|
|
|
self.assertEqual(len(channel.json_body["media"]), 10)
|
|
|
|
|
self._check_fields(channel.json_body["media"])
|
|
|
|
|
|
2021-08-11 15:29:59 -04:00
|
|
|
|
def test_limit_and_from_DELETE(self):
|
|
|
|
|
"""Testing delete of media with a defined starting point and limit"""
|
|
|
|
|
|
|
|
|
|
number_media = 20
|
|
|
|
|
other_user_tok = self.login("user", "pass")
|
|
|
|
|
self._create_media_for_user(other_user_tok, number_media)
|
|
|
|
|
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"DELETE",
|
|
|
|
|
self.url + "?from=5&limit=10",
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-08-11 15:29:59 -04:00
|
|
|
|
self.assertEqual(channel.json_body["total"], 10)
|
|
|
|
|
self.assertEqual(len(channel.json_body["deleted_media"]), 10)
|
|
|
|
|
|
|
|
|
|
@parameterized.expand(["GET", "DELETE"])
|
|
|
|
|
def test_invalid_parameter(self, method: str):
|
|
|
|
|
"""If parameters are invalid, an error is returned."""
|
2021-02-22 14:38:51 -05:00
|
|
|
|
# unkown order_by
|
|
|
|
|
channel = self.make_request(
|
2021-08-11 15:29:59 -04:00
|
|
|
|
method,
|
2021-02-22 14:38:51 -05:00
|
|
|
|
self.url + "?order_by=bar",
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2021-12-09 06:23:34 -05:00
|
|
|
|
self.assertEqual(Codes.INVALID_PARAM, channel.json_body["errcode"])
|
2020-10-27 10:12:31 -04:00
|
|
|
|
|
2021-02-22 14:38:51 -05:00
|
|
|
|
# invalid search order
|
|
|
|
|
channel = self.make_request(
|
2021-08-11 15:29:59 -04:00
|
|
|
|
method,
|
2021-02-22 14:38:51 -05:00
|
|
|
|
self.url + "?dir=bar",
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2021-12-09 06:23:34 -05:00
|
|
|
|
self.assertEqual(Codes.INVALID_PARAM, channel.json_body["errcode"])
|
2021-02-22 14:38:51 -05:00
|
|
|
|
|
|
|
|
|
# negative limit
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
2021-08-11 15:29:59 -04:00
|
|
|
|
method,
|
2020-10-27 10:12:31 -04:00
|
|
|
|
self.url + "?limit=-5",
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2020-10-27 10:12:31 -04:00
|
|
|
|
self.assertEqual(Codes.INVALID_PARAM, channel.json_body["errcode"])
|
|
|
|
|
|
2021-02-22 14:38:51 -05:00
|
|
|
|
# negative from
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
2021-08-11 15:29:59 -04:00
|
|
|
|
method,
|
2020-10-27 10:12:31 -04:00
|
|
|
|
self.url + "?from=-5",
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2020-10-27 10:12:31 -04:00
|
|
|
|
self.assertEqual(Codes.INVALID_PARAM, channel.json_body["errcode"])
|
|
|
|
|
|
|
|
|
|
def test_next_token(self):
|
|
|
|
|
"""
|
|
|
|
|
Testing that `next_token` appears at the right place
|
2021-08-11 15:29:59 -04:00
|
|
|
|
|
|
|
|
|
For deleting media `next_token` is not useful, because
|
|
|
|
|
after deleting media the media has a new order.
|
2020-10-27 10:12:31 -04:00
|
|
|
|
"""
|
|
|
|
|
|
|
|
|
|
number_media = 20
|
|
|
|
|
other_user_tok = self.login("user", "pass")
|
2021-02-22 14:38:51 -05:00
|
|
|
|
self._create_media_for_user(other_user_tok, number_media)
|
2020-10-27 10:12:31 -04:00
|
|
|
|
|
|
|
|
|
# `next_token` does not appear
|
|
|
|
|
# Number of results is the number of entries
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
2020-10-27 10:12:31 -04:00
|
|
|
|
"GET",
|
|
|
|
|
self.url + "?limit=20",
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-10-27 10:12:31 -04:00
|
|
|
|
self.assertEqual(channel.json_body["total"], number_media)
|
|
|
|
|
self.assertEqual(len(channel.json_body["media"]), number_media)
|
|
|
|
|
self.assertNotIn("next_token", channel.json_body)
|
|
|
|
|
|
|
|
|
|
# `next_token` does not appear
|
|
|
|
|
# Number of max results is larger than the number of entries
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
2020-10-27 10:12:31 -04:00
|
|
|
|
"GET",
|
|
|
|
|
self.url + "?limit=21",
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-10-27 10:12:31 -04:00
|
|
|
|
self.assertEqual(channel.json_body["total"], number_media)
|
|
|
|
|
self.assertEqual(len(channel.json_body["media"]), number_media)
|
|
|
|
|
self.assertNotIn("next_token", channel.json_body)
|
|
|
|
|
|
|
|
|
|
# `next_token` does appear
|
|
|
|
|
# Number of max results is smaller than the number of entries
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
2020-10-27 10:12:31 -04:00
|
|
|
|
"GET",
|
|
|
|
|
self.url + "?limit=19",
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-10-27 10:12:31 -04:00
|
|
|
|
self.assertEqual(channel.json_body["total"], number_media)
|
|
|
|
|
self.assertEqual(len(channel.json_body["media"]), 19)
|
|
|
|
|
self.assertEqual(channel.json_body["next_token"], 19)
|
|
|
|
|
|
|
|
|
|
# Check
|
|
|
|
|
# Set `from` to value of `next_token` for request remaining entries
|
|
|
|
|
# `next_token` does not appear
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
2020-10-27 10:12:31 -04:00
|
|
|
|
"GET",
|
|
|
|
|
self.url + "?from=19",
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-10-27 10:12:31 -04:00
|
|
|
|
self.assertEqual(channel.json_body["total"], number_media)
|
|
|
|
|
self.assertEqual(len(channel.json_body["media"]), 1)
|
|
|
|
|
self.assertNotIn("next_token", channel.json_body)
|
|
|
|
|
|
2021-08-11 15:29:59 -04:00
|
|
|
|
def test_user_has_no_media_GET(self):
|
2020-10-27 10:12:31 -04:00
|
|
|
|
"""
|
|
|
|
|
Tests that a normal lookup for media is successfully
|
|
|
|
|
if user has no media created
|
|
|
|
|
"""
|
|
|
|
|
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
self.url,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
2020-10-27 10:12:31 -04:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-10-27 10:12:31 -04:00
|
|
|
|
self.assertEqual(0, channel.json_body["total"])
|
|
|
|
|
self.assertEqual(0, len(channel.json_body["media"]))
|
|
|
|
|
|
2021-08-11 15:29:59 -04:00
|
|
|
|
def test_user_has_no_media_DELETE(self):
|
2020-10-27 10:12:31 -04:00
|
|
|
|
"""
|
2021-08-11 15:29:59 -04:00
|
|
|
|
Tests that a delete is successful if user has no media
|
2020-10-27 10:12:31 -04:00
|
|
|
|
"""
|
|
|
|
|
|
2021-08-11 15:29:59 -04:00
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"DELETE",
|
|
|
|
|
self.url,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-08-11 15:29:59 -04:00
|
|
|
|
self.assertEqual(0, channel.json_body["total"])
|
|
|
|
|
self.assertEqual(0, len(channel.json_body["deleted_media"]))
|
|
|
|
|
|
|
|
|
|
def test_get_media(self):
|
|
|
|
|
"""Tests that a normal lookup for media is successful"""
|
|
|
|
|
|
2020-10-27 10:12:31 -04:00
|
|
|
|
number_media = 5
|
|
|
|
|
other_user_tok = self.login("user", "pass")
|
2021-02-22 14:38:51 -05:00
|
|
|
|
self._create_media_for_user(other_user_tok, number_media)
|
2020-10-27 10:12:31 -04:00
|
|
|
|
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
self.url,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
2020-10-27 10:12:31 -04:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-10-27 10:12:31 -04:00
|
|
|
|
self.assertEqual(number_media, channel.json_body["total"])
|
|
|
|
|
self.assertEqual(number_media, len(channel.json_body["media"]))
|
|
|
|
|
self.assertNotIn("next_token", channel.json_body)
|
|
|
|
|
self._check_fields(channel.json_body["media"])
|
|
|
|
|
|
2021-08-11 15:29:59 -04:00
|
|
|
|
def test_delete_media(self):
|
|
|
|
|
"""Tests that a normal delete of media is successful"""
|
|
|
|
|
|
|
|
|
|
number_media = 5
|
|
|
|
|
other_user_tok = self.login("user", "pass")
|
|
|
|
|
media_ids = self._create_media_for_user(other_user_tok, number_media)
|
|
|
|
|
|
|
|
|
|
# Test if the file exists
|
|
|
|
|
local_paths = []
|
|
|
|
|
for media_id in media_ids:
|
|
|
|
|
local_path = self.filepaths.local_media_filepath(media_id)
|
|
|
|
|
self.assertTrue(os.path.exists(local_path))
|
|
|
|
|
local_paths.append(local_path)
|
|
|
|
|
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"DELETE",
|
|
|
|
|
self.url,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-08-11 15:29:59 -04:00
|
|
|
|
self.assertEqual(number_media, channel.json_body["total"])
|
|
|
|
|
self.assertEqual(number_media, len(channel.json_body["deleted_media"]))
|
|
|
|
|
self.assertCountEqual(channel.json_body["deleted_media"], media_ids)
|
|
|
|
|
|
|
|
|
|
# Test if the file is deleted
|
|
|
|
|
for local_path in local_paths:
|
|
|
|
|
self.assertFalse(os.path.exists(local_path))
|
|
|
|
|
|
2021-02-22 14:38:51 -05:00
|
|
|
|
def test_order_by(self):
|
|
|
|
|
"""
|
|
|
|
|
Testing order list with parameter `order_by`
|
|
|
|
|
"""
|
|
|
|
|
|
|
|
|
|
other_user_tok = self.login("user", "pass")
|
|
|
|
|
|
|
|
|
|
# Resolution: 1×1, MIME type: image/png, Extension: png, Size: 67 B
|
2021-09-16 12:01:14 -04:00
|
|
|
|
image_data1 = SMALL_PNG
|
2021-02-22 14:38:51 -05:00
|
|
|
|
# Resolution: 1×1, MIME type: image/gif, Extension: gif, Size: 35 B
|
|
|
|
|
image_data2 = unhexlify(
|
|
|
|
|
b"47494638376101000100800100000000"
|
|
|
|
|
b"ffffff2c00000000010001000002024c"
|
|
|
|
|
b"01003b"
|
|
|
|
|
)
|
|
|
|
|
# Resolution: 1×1, MIME type: image/bmp, Extension: bmp, Size: 54 B
|
|
|
|
|
image_data3 = unhexlify(
|
|
|
|
|
b"424d3a0000000000000036000000280000000100000001000000"
|
|
|
|
|
b"0100180000000000040000000000000000000000000000000000"
|
|
|
|
|
b"0000"
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
# create media and make sure they do not have the same timestamp
|
|
|
|
|
media1 = self._create_media_and_access(other_user_tok, image_data1, "image.png")
|
|
|
|
|
self.pump(1.0)
|
|
|
|
|
media2 = self._create_media_and_access(other_user_tok, image_data2, "image.gif")
|
|
|
|
|
self.pump(1.0)
|
|
|
|
|
media3 = self._create_media_and_access(other_user_tok, image_data3, "image.bmp")
|
|
|
|
|
self.pump(1.0)
|
|
|
|
|
|
|
|
|
|
# Mark one media as safe from quarantine.
|
|
|
|
|
self.get_success(self.store.mark_local_media_as_safe(media2))
|
|
|
|
|
# Quarantine one media
|
|
|
|
|
self.get_success(
|
|
|
|
|
self.store.quarantine_media_by_id("test", media3, self.admin_user)
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
# order by default ("created_ts")
|
|
|
|
|
# default is backwards
|
|
|
|
|
self._order_test([media3, media2, media1], None)
|
|
|
|
|
self._order_test([media1, media2, media3], None, "f")
|
|
|
|
|
self._order_test([media3, media2, media1], None, "b")
|
|
|
|
|
|
|
|
|
|
# sort by media_id
|
|
|
|
|
sorted_media = sorted([media1, media2, media3], reverse=False)
|
|
|
|
|
sorted_media_reverse = sorted(sorted_media, reverse=True)
|
|
|
|
|
|
|
|
|
|
# order by media_id
|
|
|
|
|
self._order_test(sorted_media, "media_id")
|
|
|
|
|
self._order_test(sorted_media, "media_id", "f")
|
|
|
|
|
self._order_test(sorted_media_reverse, "media_id", "b")
|
|
|
|
|
|
|
|
|
|
# order by upload_name
|
|
|
|
|
self._order_test([media3, media2, media1], "upload_name")
|
|
|
|
|
self._order_test([media3, media2, media1], "upload_name", "f")
|
|
|
|
|
self._order_test([media1, media2, media3], "upload_name", "b")
|
|
|
|
|
|
|
|
|
|
# order by media_type
|
|
|
|
|
# result is ordered by media_id
|
|
|
|
|
# because of uploaded media_type is always 'application/json'
|
|
|
|
|
self._order_test(sorted_media, "media_type")
|
|
|
|
|
self._order_test(sorted_media, "media_type", "f")
|
|
|
|
|
self._order_test(sorted_media, "media_type", "b")
|
|
|
|
|
|
|
|
|
|
# order by media_length
|
|
|
|
|
self._order_test([media2, media3, media1], "media_length")
|
|
|
|
|
self._order_test([media2, media3, media1], "media_length", "f")
|
|
|
|
|
self._order_test([media1, media3, media2], "media_length", "b")
|
|
|
|
|
|
|
|
|
|
# order by created_ts
|
|
|
|
|
self._order_test([media1, media2, media3], "created_ts")
|
|
|
|
|
self._order_test([media1, media2, media3], "created_ts", "f")
|
|
|
|
|
self._order_test([media3, media2, media1], "created_ts", "b")
|
|
|
|
|
|
|
|
|
|
# order by last_access_ts
|
|
|
|
|
self._order_test([media1, media2, media3], "last_access_ts")
|
|
|
|
|
self._order_test([media1, media2, media3], "last_access_ts", "f")
|
|
|
|
|
self._order_test([media3, media2, media1], "last_access_ts", "b")
|
|
|
|
|
|
|
|
|
|
# order by quarantined_by
|
|
|
|
|
# one media is in quarantine, others are ordered by media_ids
|
|
|
|
|
|
|
|
|
|
# Different sort order of SQlite and PostreSQL
|
|
|
|
|
# If a media is not in quarantine `quarantined_by` is NULL
|
|
|
|
|
# SQLite considers NULL to be smaller than any other value.
|
|
|
|
|
# PostreSQL considers NULL to be larger than any other value.
|
|
|
|
|
|
|
|
|
|
# self._order_test(sorted([media1, media2]) + [media3], "quarantined_by")
|
|
|
|
|
# self._order_test(sorted([media1, media2]) + [media3], "quarantined_by", "f")
|
|
|
|
|
# self._order_test([media3] + sorted([media1, media2]), "quarantined_by", "b")
|
|
|
|
|
|
|
|
|
|
# order by safe_from_quarantine
|
|
|
|
|
# one media is safe from quarantine, others are ordered by media_ids
|
|
|
|
|
self._order_test(sorted([media1, media3]) + [media2], "safe_from_quarantine")
|
|
|
|
|
self._order_test(
|
|
|
|
|
sorted([media1, media3]) + [media2], "safe_from_quarantine", "f"
|
|
|
|
|
)
|
|
|
|
|
self._order_test(
|
|
|
|
|
[media2] + sorted([media1, media3]), "safe_from_quarantine", "b"
|
|
|
|
|
)
|
|
|
|
|
|
2021-08-11 15:29:59 -04:00
|
|
|
|
def _create_media_for_user(self, user_token: str, number_media: int) -> List[str]:
|
2020-10-27 10:12:31 -04:00
|
|
|
|
"""
|
|
|
|
|
Create a number of media for a specific user
|
2021-02-22 14:38:51 -05:00
|
|
|
|
Args:
|
|
|
|
|
user_token: Access token of the user
|
|
|
|
|
number_media: Number of media to be created for the user
|
2021-08-11 15:29:59 -04:00
|
|
|
|
Returns:
|
|
|
|
|
List of created media ID
|
2020-10-27 10:12:31 -04:00
|
|
|
|
"""
|
2021-08-11 15:29:59 -04:00
|
|
|
|
media_ids = []
|
2021-04-20 06:50:49 -04:00
|
|
|
|
for _ in range(number_media):
|
2021-09-16 12:01:14 -04:00
|
|
|
|
media_ids.append(self._create_media_and_access(user_token, SMALL_PNG))
|
2021-08-11 15:29:59 -04:00
|
|
|
|
|
|
|
|
|
return media_ids
|
2021-02-22 14:38:51 -05:00
|
|
|
|
|
|
|
|
|
def _create_media_and_access(
|
|
|
|
|
self,
|
|
|
|
|
user_token: str,
|
|
|
|
|
image_data: bytes,
|
|
|
|
|
filename: str = "image1.png",
|
|
|
|
|
) -> str:
|
|
|
|
|
"""
|
|
|
|
|
Create one media for a specific user, access and returns `media_id`
|
|
|
|
|
Args:
|
|
|
|
|
user_token: Access token of the user
|
|
|
|
|
image_data: binary data of image
|
|
|
|
|
filename: The filename of the media to be uploaded
|
|
|
|
|
Returns:
|
|
|
|
|
The ID of the newly created media.
|
|
|
|
|
"""
|
|
|
|
|
upload_resource = self.media_repo.children[b"upload"]
|
|
|
|
|
download_resource = self.media_repo.children[b"download"]
|
|
|
|
|
|
|
|
|
|
# Upload some media into the room
|
|
|
|
|
response = self.helper.upload_media(
|
2021-11-30 04:53:54 -05:00
|
|
|
|
upload_resource, image_data, user_token, filename, expect_code=HTTPStatus.OK
|
2021-02-22 14:38:51 -05:00
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
# Extract media ID from the response
|
|
|
|
|
server_and_media_id = response["content_uri"][6:] # Cut off 'mxc://'
|
|
|
|
|
media_id = server_and_media_id.split("/")[1]
|
|
|
|
|
|
|
|
|
|
# Try to access a media and to create `last_access_ts`
|
|
|
|
|
channel = make_request(
|
|
|
|
|
self.reactor,
|
2021-09-24 06:01:25 -04:00
|
|
|
|
FakeSite(download_resource, self.reactor),
|
2021-02-22 14:38:51 -05:00
|
|
|
|
"GET",
|
|
|
|
|
server_and_media_id,
|
|
|
|
|
shorthand=False,
|
|
|
|
|
access_token=user_token,
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
self.assertEqual(
|
2021-11-30 04:53:54 -05:00
|
|
|
|
HTTPStatus.OK,
|
2021-02-22 14:38:51 -05:00
|
|
|
|
channel.code,
|
|
|
|
|
msg=(
|
2021-11-30 04:53:54 -05:00
|
|
|
|
f"Expected to receive a HTTPStatus.OK on accessing media: {server_and_media_id}"
|
2021-02-22 14:38:51 -05:00
|
|
|
|
),
|
|
|
|
|
)
|
2020-10-27 10:12:31 -04:00
|
|
|
|
|
2021-02-22 14:38:51 -05:00
|
|
|
|
return media_id
|
|
|
|
|
|
2021-12-03 08:57:13 -05:00
|
|
|
|
def _check_fields(self, content: List[JsonDict]):
|
2021-02-22 14:38:51 -05:00
|
|
|
|
"""Checks that the expected user attributes are present in content
|
|
|
|
|
Args:
|
|
|
|
|
content: List that is checked for content
|
|
|
|
|
"""
|
2020-10-27 10:12:31 -04:00
|
|
|
|
for m in content:
|
|
|
|
|
self.assertIn("media_id", m)
|
|
|
|
|
self.assertIn("media_type", m)
|
|
|
|
|
self.assertIn("media_length", m)
|
|
|
|
|
self.assertIn("upload_name", m)
|
|
|
|
|
self.assertIn("created_ts", m)
|
|
|
|
|
self.assertIn("last_access_ts", m)
|
|
|
|
|
self.assertIn("quarantined_by", m)
|
|
|
|
|
self.assertIn("safe_from_quarantine", m)
|
2020-11-17 05:51:25 -05:00
|
|
|
|
|
2021-02-22 14:38:51 -05:00
|
|
|
|
def _order_test(
|
|
|
|
|
self,
|
|
|
|
|
expected_media_list: List[str],
|
|
|
|
|
order_by: Optional[str],
|
|
|
|
|
dir: Optional[str] = None,
|
|
|
|
|
):
|
|
|
|
|
"""Request the list of media in a certain order. Assert that order is what
|
|
|
|
|
we expect
|
|
|
|
|
Args:
|
|
|
|
|
expected_media_list: The list of media_ids in the order we expect to get
|
|
|
|
|
back from the server
|
|
|
|
|
order_by: The type of ordering to give the server
|
|
|
|
|
dir: The direction of ordering to give the server
|
|
|
|
|
"""
|
|
|
|
|
|
|
|
|
|
url = self.url + "?"
|
|
|
|
|
if order_by is not None:
|
2021-08-11 15:29:59 -04:00
|
|
|
|
url += f"order_by={order_by}&"
|
2021-02-22 14:38:51 -05:00
|
|
|
|
if dir is not None and dir in ("b", "f"):
|
2021-08-11 15:29:59 -04:00
|
|
|
|
url += f"dir={dir}"
|
2021-02-22 14:38:51 -05:00
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
2021-08-11 15:29:59 -04:00
|
|
|
|
url,
|
2021-02-22 14:38:51 -05:00
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-02-22 14:38:51 -05:00
|
|
|
|
self.assertEqual(channel.json_body["total"], len(expected_media_list))
|
|
|
|
|
|
|
|
|
|
returned_order = [row["media_id"] for row in channel.json_body["media"]]
|
|
|
|
|
self.assertEqual(expected_media_list, returned_order)
|
|
|
|
|
self._check_fields(channel.json_body["media"])
|
|
|
|
|
|
2020-11-17 05:51:25 -05:00
|
|
|
|
|
|
|
|
|
class UserTokenRestTestCase(unittest.HomeserverTestCase):
|
|
|
|
|
"""Test for /_synapse/admin/v1/users/<user>/login"""
|
|
|
|
|
|
|
|
|
|
servlets = [
|
|
|
|
|
synapse.rest.admin.register_servlets,
|
|
|
|
|
login.register_servlets,
|
|
|
|
|
sync.register_servlets,
|
|
|
|
|
room.register_servlets,
|
|
|
|
|
devices.register_servlets,
|
|
|
|
|
logout.register_servlets,
|
|
|
|
|
]
|
|
|
|
|
|
|
|
|
|
def prepare(self, reactor, clock, hs):
|
|
|
|
|
self.store = hs.get_datastore()
|
|
|
|
|
|
|
|
|
|
self.admin_user = self.register_user("admin", "pass", admin=True)
|
|
|
|
|
self.admin_user_tok = self.login("admin", "pass")
|
|
|
|
|
|
|
|
|
|
self.other_user = self.register_user("user", "pass")
|
|
|
|
|
self.other_user_tok = self.login("user", "pass")
|
|
|
|
|
self.url = "/_synapse/admin/v1/users/%s/login" % urllib.parse.quote(
|
|
|
|
|
self.other_user
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
def _get_token(self) -> str:
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
2020-11-17 05:51:25 -05:00
|
|
|
|
"POST", self.url, b"{}", access_token=self.admin_user_tok
|
|
|
|
|
)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-11-17 05:51:25 -05:00
|
|
|
|
return channel.json_body["access_token"]
|
|
|
|
|
|
|
|
|
|
def test_no_auth(self):
|
|
|
|
|
"""Try to login as a user without authentication."""
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request("POST", self.url, b"{}")
|
2020-11-17 05:51:25 -05:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.UNAUTHORIZED, channel.code, msg=channel.json_body)
|
2020-11-17 05:51:25 -05:00
|
|
|
|
self.assertEqual(Codes.MISSING_TOKEN, channel.json_body["errcode"])
|
|
|
|
|
|
|
|
|
|
def test_not_admin(self):
|
|
|
|
|
"""Try to login as a user as a non-admin user."""
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
2020-11-17 05:51:25 -05:00
|
|
|
|
"POST", self.url, b"{}", access_token=self.other_user_tok
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.FORBIDDEN, channel.code, msg=channel.json_body)
|
2020-11-17 05:51:25 -05:00
|
|
|
|
|
|
|
|
|
def test_send_event(self):
|
|
|
|
|
"""Test that sending event as a user works."""
|
|
|
|
|
# Create a room.
|
|
|
|
|
room_id = self.helper.create_room_as(self.other_user, tok=self.other_user_tok)
|
|
|
|
|
|
|
|
|
|
# Login in as the user
|
|
|
|
|
puppet_token = self._get_token()
|
|
|
|
|
|
|
|
|
|
# Test that sending works, and generates the event as the right user.
|
|
|
|
|
resp = self.helper.send_event(room_id, "com.example.test", tok=puppet_token)
|
|
|
|
|
event_id = resp["event_id"]
|
|
|
|
|
event = self.get_success(self.store.get_event(event_id))
|
|
|
|
|
self.assertEqual(event.sender, self.other_user)
|
|
|
|
|
|
|
|
|
|
def test_devices(self):
|
|
|
|
|
"""Tests that logging in as a user doesn't create a new device for them."""
|
|
|
|
|
# Login in as the user
|
|
|
|
|
self._get_token()
|
|
|
|
|
|
|
|
|
|
# Check that we don't see a new device in our devices list
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
2020-11-17 05:51:25 -05:00
|
|
|
|
"GET", "devices", b"{}", access_token=self.other_user_tok
|
|
|
|
|
)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-11-17 05:51:25 -05:00
|
|
|
|
|
|
|
|
|
# We should only see the one device (from the login in `prepare`)
|
|
|
|
|
self.assertEqual(len(channel.json_body["devices"]), 1)
|
|
|
|
|
|
|
|
|
|
def test_logout(self):
|
|
|
|
|
"""Test that calling `/logout` with the token works."""
|
|
|
|
|
# Login in as the user
|
|
|
|
|
puppet_token = self._get_token()
|
|
|
|
|
|
|
|
|
|
# Test that we can successfully make a request
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request("GET", "devices", b"{}", access_token=puppet_token)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-11-17 05:51:25 -05:00
|
|
|
|
|
|
|
|
|
# Logout with the puppet token
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request("POST", "logout", b"{}", access_token=puppet_token)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-11-17 05:51:25 -05:00
|
|
|
|
|
|
|
|
|
# The puppet token should no longer work
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request("GET", "devices", b"{}", access_token=puppet_token)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.UNAUTHORIZED, channel.code, msg=channel.json_body)
|
2020-11-17 05:51:25 -05:00
|
|
|
|
|
|
|
|
|
# .. but the real user's tokens should still work
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
2020-11-17 05:51:25 -05:00
|
|
|
|
"GET", "devices", b"{}", access_token=self.other_user_tok
|
|
|
|
|
)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-11-17 05:51:25 -05:00
|
|
|
|
|
|
|
|
|
def test_user_logout_all(self):
|
|
|
|
|
"""Tests that the target user calling `/logout/all` does *not* expire
|
|
|
|
|
the token.
|
|
|
|
|
"""
|
|
|
|
|
# Login in as the user
|
|
|
|
|
puppet_token = self._get_token()
|
|
|
|
|
|
|
|
|
|
# Test that we can successfully make a request
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request("GET", "devices", b"{}", access_token=puppet_token)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-11-17 05:51:25 -05:00
|
|
|
|
|
|
|
|
|
# Logout all with the real user token
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
2020-11-17 05:51:25 -05:00
|
|
|
|
"POST", "logout/all", b"{}", access_token=self.other_user_tok
|
|
|
|
|
)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-11-17 05:51:25 -05:00
|
|
|
|
|
|
|
|
|
# The puppet token should still work
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request("GET", "devices", b"{}", access_token=puppet_token)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-11-17 05:51:25 -05:00
|
|
|
|
|
|
|
|
|
# .. but the real user's tokens shouldn't
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
2020-11-17 05:51:25 -05:00
|
|
|
|
"GET", "devices", b"{}", access_token=self.other_user_tok
|
|
|
|
|
)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.UNAUTHORIZED, channel.code, msg=channel.json_body)
|
2020-11-17 05:51:25 -05:00
|
|
|
|
|
|
|
|
|
def test_admin_logout_all(self):
|
|
|
|
|
"""Tests that the admin user calling `/logout/all` does expire the
|
|
|
|
|
token.
|
|
|
|
|
"""
|
|
|
|
|
# Login in as the user
|
|
|
|
|
puppet_token = self._get_token()
|
|
|
|
|
|
|
|
|
|
# Test that we can successfully make a request
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request("GET", "devices", b"{}", access_token=puppet_token)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-11-17 05:51:25 -05:00
|
|
|
|
|
|
|
|
|
# Logout all with the admin user token
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
2020-11-17 05:51:25 -05:00
|
|
|
|
"POST", "logout/all", b"{}", access_token=self.admin_user_tok
|
|
|
|
|
)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-11-17 05:51:25 -05:00
|
|
|
|
|
|
|
|
|
# The puppet token should no longer work
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request("GET", "devices", b"{}", access_token=puppet_token)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.UNAUTHORIZED, channel.code, msg=channel.json_body)
|
2020-11-17 05:51:25 -05:00
|
|
|
|
|
|
|
|
|
# .. but the real user's tokens should still work
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
2020-11-17 05:51:25 -05:00
|
|
|
|
"GET", "devices", b"{}", access_token=self.other_user_tok
|
|
|
|
|
)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-11-17 05:51:25 -05:00
|
|
|
|
|
|
|
|
|
@unittest.override_config(
|
|
|
|
|
{
|
|
|
|
|
"public_baseurl": "https://example.org/",
|
|
|
|
|
"user_consent": {
|
|
|
|
|
"version": "1.0",
|
|
|
|
|
"policy_name": "My Cool Privacy Policy",
|
|
|
|
|
"template_dir": "/",
|
|
|
|
|
"require_at_registration": True,
|
|
|
|
|
"block_events_error": "You should accept the policy",
|
|
|
|
|
},
|
|
|
|
|
"form_secret": "123secret",
|
|
|
|
|
}
|
|
|
|
|
)
|
|
|
|
|
def test_consent(self):
|
|
|
|
|
"""Test that sending a message is not subject to the privacy policies."""
|
|
|
|
|
# Have the admin user accept the terms.
|
|
|
|
|
self.get_success(self.store.user_set_consent_version(self.admin_user, "1.0"))
|
|
|
|
|
|
|
|
|
|
# First, cheekily accept the terms and create a room
|
|
|
|
|
self.get_success(self.store.user_set_consent_version(self.other_user, "1.0"))
|
|
|
|
|
room_id = self.helper.create_room_as(self.other_user, tok=self.other_user_tok)
|
|
|
|
|
self.helper.send_event(room_id, "com.example.test", tok=self.other_user_tok)
|
|
|
|
|
|
|
|
|
|
# Now unaccept it and check that we can't send an event
|
|
|
|
|
self.get_success(self.store.user_set_consent_version(self.other_user, "0.0"))
|
|
|
|
|
self.helper.send_event(
|
2021-11-30 04:53:54 -05:00
|
|
|
|
room_id,
|
|
|
|
|
"com.example.test",
|
|
|
|
|
tok=self.other_user_tok,
|
|
|
|
|
expect_code=HTTPStatus.FORBIDDEN,
|
2020-11-17 05:51:25 -05:00
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
# Login in as the user
|
|
|
|
|
puppet_token = self._get_token()
|
|
|
|
|
|
|
|
|
|
# Sending an event on their behalf should work fine
|
|
|
|
|
self.helper.send_event(room_id, "com.example.test", tok=puppet_token)
|
|
|
|
|
|
|
|
|
|
@override_config(
|
|
|
|
|
{"limit_usage_by_mau": True, "max_mau_value": 1, "mau_trial_days": 0}
|
|
|
|
|
)
|
|
|
|
|
def test_mau_limit(self):
|
|
|
|
|
# Create a room as the admin user. This will bump the monthly active users to 1.
|
|
|
|
|
room_id = self.helper.create_room_as(self.admin_user, tok=self.admin_user_tok)
|
|
|
|
|
|
|
|
|
|
# Trying to join as the other user should fail due to reaching MAU limit.
|
|
|
|
|
self.helper.join(
|
2021-11-30 04:53:54 -05:00
|
|
|
|
room_id,
|
|
|
|
|
user=self.other_user,
|
|
|
|
|
tok=self.other_user_tok,
|
|
|
|
|
expect_code=HTTPStatus.FORBIDDEN,
|
2020-11-17 05:51:25 -05:00
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
# Logging in as the other user and joining a room should work, even
|
|
|
|
|
# though the MAU limit would stop the user doing so.
|
|
|
|
|
puppet_token = self._get_token()
|
|
|
|
|
self.helper.join(room_id, user=self.other_user, tok=puppet_token)
|
2020-11-25 16:26:11 -05:00
|
|
|
|
|
|
|
|
|
|
2021-10-12 15:38:48 -04:00
|
|
|
|
@parameterized_class(
|
|
|
|
|
("url_prefix",),
|
|
|
|
|
[
|
|
|
|
|
("/_synapse/admin/v1/whois/%s",),
|
|
|
|
|
("/_matrix/client/r0/admin/whois/%s",),
|
|
|
|
|
],
|
|
|
|
|
)
|
2020-11-25 16:26:11 -05:00
|
|
|
|
class WhoisRestTestCase(unittest.HomeserverTestCase):
|
|
|
|
|
|
|
|
|
|
servlets = [
|
|
|
|
|
synapse.rest.admin.register_servlets,
|
|
|
|
|
login.register_servlets,
|
|
|
|
|
]
|
|
|
|
|
|
|
|
|
|
def prepare(self, reactor, clock, hs):
|
|
|
|
|
self.admin_user = self.register_user("admin", "pass", admin=True)
|
|
|
|
|
self.admin_user_tok = self.login("admin", "pass")
|
|
|
|
|
|
|
|
|
|
self.other_user = self.register_user("user", "pass")
|
2021-10-12 15:38:48 -04:00
|
|
|
|
self.url = self.url_prefix % self.other_user
|
2020-11-25 16:26:11 -05:00
|
|
|
|
|
|
|
|
|
def test_no_auth(self):
|
|
|
|
|
"""
|
|
|
|
|
Try to get information of an user without authentication.
|
|
|
|
|
"""
|
2021-10-12 15:38:48 -04:00
|
|
|
|
channel = self.make_request("GET", self.url, b"{}")
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.UNAUTHORIZED, channel.code, msg=channel.json_body)
|
2020-11-25 16:26:11 -05:00
|
|
|
|
self.assertEqual(Codes.MISSING_TOKEN, channel.json_body["errcode"])
|
|
|
|
|
|
|
|
|
|
def test_requester_is_not_admin(self):
|
|
|
|
|
"""
|
|
|
|
|
If the user is not a server admin, an error is returned.
|
|
|
|
|
"""
|
|
|
|
|
self.register_user("user2", "pass")
|
|
|
|
|
other_user2_token = self.login("user2", "pass")
|
|
|
|
|
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
2021-10-12 15:38:48 -04:00
|
|
|
|
self.url,
|
2020-12-15 09:44:04 -05:00
|
|
|
|
access_token=other_user2_token,
|
|
|
|
|
)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.FORBIDDEN, channel.code, msg=channel.json_body)
|
2020-11-25 16:26:11 -05:00
|
|
|
|
self.assertEqual(Codes.FORBIDDEN, channel.json_body["errcode"])
|
|
|
|
|
|
|
|
|
|
def test_user_is_not_local(self):
|
|
|
|
|
"""
|
2021-11-30 04:53:54 -05:00
|
|
|
|
Tests that a lookup for a user that is not a local returns a HTTPStatus.BAD_REQUEST
|
2020-11-25 16:26:11 -05:00
|
|
|
|
"""
|
2021-10-12 15:38:48 -04:00
|
|
|
|
url = self.url_prefix % "@unknown_person:unknown_domain"
|
2020-11-25 16:26:11 -05:00
|
|
|
|
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
2021-10-12 15:38:48 -04:00
|
|
|
|
url,
|
2020-12-15 09:44:04 -05:00
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2020-11-25 16:26:11 -05:00
|
|
|
|
self.assertEqual("Can only whois a local user", channel.json_body["error"])
|
|
|
|
|
|
|
|
|
|
def test_get_whois_admin(self):
|
|
|
|
|
"""
|
|
|
|
|
The lookup should succeed for an admin.
|
|
|
|
|
"""
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
2021-10-12 15:38:48 -04:00
|
|
|
|
self.url,
|
2020-12-15 09:44:04 -05:00
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-11-25 16:26:11 -05:00
|
|
|
|
self.assertEqual(self.other_user, channel.json_body["user_id"])
|
|
|
|
|
self.assertIn("devices", channel.json_body)
|
|
|
|
|
|
|
|
|
|
def test_get_whois_user(self):
|
|
|
|
|
"""
|
|
|
|
|
The lookup should succeed for a normal user looking up their own information.
|
|
|
|
|
"""
|
|
|
|
|
other_user_token = self.login("user", "pass")
|
|
|
|
|
|
2020-12-15 09:44:04 -05:00
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
2021-10-12 15:38:48 -04:00
|
|
|
|
self.url,
|
2020-12-15 09:44:04 -05:00
|
|
|
|
access_token=other_user_token,
|
|
|
|
|
)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-11-25 16:26:11 -05:00
|
|
|
|
self.assertEqual(self.other_user, channel.json_body["user_id"])
|
|
|
|
|
self.assertIn("devices", channel.json_body)
|
2021-01-25 14:49:39 -05:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
class ShadowBanRestTestCase(unittest.HomeserverTestCase):
|
|
|
|
|
|
|
|
|
|
servlets = [
|
|
|
|
|
synapse.rest.admin.register_servlets,
|
|
|
|
|
login.register_servlets,
|
|
|
|
|
]
|
|
|
|
|
|
|
|
|
|
def prepare(self, reactor, clock, hs):
|
|
|
|
|
self.store = hs.get_datastore()
|
|
|
|
|
|
|
|
|
|
self.admin_user = self.register_user("admin", "pass", admin=True)
|
|
|
|
|
self.admin_user_tok = self.login("admin", "pass")
|
|
|
|
|
|
|
|
|
|
self.other_user = self.register_user("user", "pass")
|
|
|
|
|
|
|
|
|
|
self.url = "/_synapse/admin/v1/users/%s/shadow_ban" % urllib.parse.quote(
|
|
|
|
|
self.other_user
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-16 07:43:53 -05:00
|
|
|
|
@parameterized.expand(["POST", "DELETE"])
|
|
|
|
|
def test_no_auth(self, method: str):
|
2021-01-25 14:49:39 -05:00
|
|
|
|
"""
|
|
|
|
|
Try to get information of an user without authentication.
|
|
|
|
|
"""
|
2021-11-16 07:43:53 -05:00
|
|
|
|
channel = self.make_request(method, self.url)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.UNAUTHORIZED, channel.code, msg=channel.json_body)
|
2021-01-25 14:49:39 -05:00
|
|
|
|
self.assertEqual(Codes.MISSING_TOKEN, channel.json_body["errcode"])
|
|
|
|
|
|
2021-11-16 07:43:53 -05:00
|
|
|
|
@parameterized.expand(["POST", "DELETE"])
|
|
|
|
|
def test_requester_is_not_admin(self, method: str):
|
2021-01-25 14:49:39 -05:00
|
|
|
|
"""
|
|
|
|
|
If the user is not a server admin, an error is returned.
|
|
|
|
|
"""
|
|
|
|
|
other_user_token = self.login("user", "pass")
|
|
|
|
|
|
2021-11-16 07:43:53 -05:00
|
|
|
|
channel = self.make_request(method, self.url, access_token=other_user_token)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.FORBIDDEN, channel.code, msg=channel.json_body)
|
2021-01-25 14:49:39 -05:00
|
|
|
|
self.assertEqual(Codes.FORBIDDEN, channel.json_body["errcode"])
|
|
|
|
|
|
2021-11-16 07:43:53 -05:00
|
|
|
|
@parameterized.expand(["POST", "DELETE"])
|
|
|
|
|
def test_user_is_not_local(self, method: str):
|
2021-01-25 14:49:39 -05:00
|
|
|
|
"""
|
2021-11-30 04:53:54 -05:00
|
|
|
|
Tests that shadow-banning for a user that is not a local returns a HTTPStatus.BAD_REQUEST
|
2021-01-25 14:49:39 -05:00
|
|
|
|
"""
|
|
|
|
|
url = "/_synapse/admin/v1/whois/@unknown_person:unknown_domain"
|
|
|
|
|
|
2021-11-16 07:43:53 -05:00
|
|
|
|
channel = self.make_request(method, url, access_token=self.admin_user_tok)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2021-01-25 14:49:39 -05:00
|
|
|
|
|
|
|
|
|
def test_success(self):
|
|
|
|
|
"""
|
|
|
|
|
Shadow-banning should succeed for an admin.
|
|
|
|
|
"""
|
|
|
|
|
# The user starts off as not shadow-banned.
|
|
|
|
|
other_user_token = self.login("user", "pass")
|
|
|
|
|
result = self.get_success(self.store.get_user_by_access_token(other_user_token))
|
|
|
|
|
self.assertFalse(result.shadow_banned)
|
|
|
|
|
|
|
|
|
|
channel = self.make_request("POST", self.url, access_token=self.admin_user_tok)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-01-25 14:49:39 -05:00
|
|
|
|
self.assertEqual({}, channel.json_body)
|
|
|
|
|
|
|
|
|
|
# Ensure the user is shadow-banned (and the cache was cleared).
|
|
|
|
|
result = self.get_success(self.store.get_user_by_access_token(other_user_token))
|
|
|
|
|
self.assertTrue(result.shadow_banned)
|
2021-04-13 05:26:37 -04:00
|
|
|
|
|
2021-11-16 07:43:53 -05:00
|
|
|
|
# Un-shadow-ban the user.
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"DELETE", self.url, access_token=self.admin_user_tok
|
|
|
|
|
)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-11-16 07:43:53 -05:00
|
|
|
|
self.assertEqual({}, channel.json_body)
|
|
|
|
|
|
|
|
|
|
# Ensure the user is no longer shadow-banned (and the cache was cleared).
|
|
|
|
|
result = self.get_success(self.store.get_user_by_access_token(other_user_token))
|
|
|
|
|
self.assertFalse(result.shadow_banned)
|
|
|
|
|
|
2021-04-13 05:26:37 -04:00
|
|
|
|
|
|
|
|
|
class RateLimitTestCase(unittest.HomeserverTestCase):
|
|
|
|
|
|
|
|
|
|
servlets = [
|
|
|
|
|
synapse.rest.admin.register_servlets,
|
|
|
|
|
login.register_servlets,
|
|
|
|
|
]
|
|
|
|
|
|
|
|
|
|
def prepare(self, reactor, clock, hs):
|
|
|
|
|
self.store = hs.get_datastore()
|
|
|
|
|
|
|
|
|
|
self.admin_user = self.register_user("admin", "pass", admin=True)
|
|
|
|
|
self.admin_user_tok = self.login("admin", "pass")
|
|
|
|
|
|
|
|
|
|
self.other_user = self.register_user("user", "pass")
|
|
|
|
|
self.url = (
|
|
|
|
|
"/_synapse/admin/v1/users/%s/override_ratelimit"
|
|
|
|
|
% urllib.parse.quote(self.other_user)
|
|
|
|
|
)
|
|
|
|
|
|
2021-10-12 15:38:48 -04:00
|
|
|
|
@parameterized.expand(["GET", "POST", "DELETE"])
|
|
|
|
|
def test_no_auth(self, method: str):
|
2021-04-13 05:26:37 -04:00
|
|
|
|
"""
|
|
|
|
|
Try to get information of a user without authentication.
|
|
|
|
|
"""
|
2021-10-12 15:38:48 -04:00
|
|
|
|
channel = self.make_request(method, self.url, b"{}")
|
2021-04-13 05:26:37 -04:00
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.UNAUTHORIZED, channel.code, msg=channel.json_body)
|
2021-04-13 05:26:37 -04:00
|
|
|
|
self.assertEqual(Codes.MISSING_TOKEN, channel.json_body["errcode"])
|
|
|
|
|
|
2021-10-12 15:38:48 -04:00
|
|
|
|
@parameterized.expand(["GET", "POST", "DELETE"])
|
|
|
|
|
def test_requester_is_no_admin(self, method: str):
|
2021-04-13 05:26:37 -04:00
|
|
|
|
"""
|
|
|
|
|
If the user is not a server admin, an error is returned.
|
|
|
|
|
"""
|
|
|
|
|
other_user_token = self.login("user", "pass")
|
|
|
|
|
|
|
|
|
|
channel = self.make_request(
|
2021-10-12 15:38:48 -04:00
|
|
|
|
method,
|
2021-04-13 05:26:37 -04:00
|
|
|
|
self.url,
|
|
|
|
|
access_token=other_user_token,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.FORBIDDEN, channel.code, msg=channel.json_body)
|
2021-04-13 05:26:37 -04:00
|
|
|
|
self.assertEqual(Codes.FORBIDDEN, channel.json_body["errcode"])
|
|
|
|
|
|
2021-10-12 15:38:48 -04:00
|
|
|
|
@parameterized.expand(["GET", "POST", "DELETE"])
|
|
|
|
|
def test_user_does_not_exist(self, method: str):
|
2021-04-13 05:26:37 -04:00
|
|
|
|
"""
|
2021-11-30 04:53:54 -05:00
|
|
|
|
Tests that a lookup for a user that does not exist returns a HTTPStatus.NOT_FOUND
|
2021-04-13 05:26:37 -04:00
|
|
|
|
"""
|
|
|
|
|
url = "/_synapse/admin/v1/users/@unknown_person:test/override_ratelimit"
|
|
|
|
|
|
|
|
|
|
channel = self.make_request(
|
2021-10-12 15:38:48 -04:00
|
|
|
|
method,
|
2021-04-13 05:26:37 -04:00
|
|
|
|
url,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.NOT_FOUND, channel.code, msg=channel.json_body)
|
2021-04-13 05:26:37 -04:00
|
|
|
|
self.assertEqual(Codes.NOT_FOUND, channel.json_body["errcode"])
|
|
|
|
|
|
2021-10-12 15:38:48 -04:00
|
|
|
|
@parameterized.expand(
|
|
|
|
|
[
|
|
|
|
|
("GET", "Can only look up local users"),
|
|
|
|
|
("POST", "Only local users can be ratelimited"),
|
|
|
|
|
("DELETE", "Only local users can be ratelimited"),
|
|
|
|
|
]
|
|
|
|
|
)
|
|
|
|
|
def test_user_is_not_local(self, method: str, error_msg: str):
|
2021-04-13 05:26:37 -04:00
|
|
|
|
"""
|
2021-11-30 04:53:54 -05:00
|
|
|
|
Tests that a lookup for a user that is not a local returns a HTTPStatus.BAD_REQUEST
|
2021-04-13 05:26:37 -04:00
|
|
|
|
"""
|
|
|
|
|
url = (
|
|
|
|
|
"/_synapse/admin/v1/users/@unknown_person:unknown_domain/override_ratelimit"
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
channel = self.make_request(
|
2021-10-12 15:38:48 -04:00
|
|
|
|
method,
|
2021-04-13 05:26:37 -04:00
|
|
|
|
url,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2021-10-12 15:38:48 -04:00
|
|
|
|
self.assertEqual(error_msg, channel.json_body["error"])
|
2021-04-13 05:26:37 -04:00
|
|
|
|
|
|
|
|
|
def test_invalid_parameter(self):
|
|
|
|
|
"""
|
|
|
|
|
If parameters are invalid, an error is returned.
|
|
|
|
|
"""
|
|
|
|
|
# messages_per_second is a string
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"POST",
|
|
|
|
|
self.url,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
content={"messages_per_second": "string"},
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2021-04-13 05:26:37 -04:00
|
|
|
|
self.assertEqual(Codes.INVALID_PARAM, channel.json_body["errcode"])
|
|
|
|
|
|
|
|
|
|
# messages_per_second is negative
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"POST",
|
|
|
|
|
self.url,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
content={"messages_per_second": -1},
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2021-04-13 05:26:37 -04:00
|
|
|
|
self.assertEqual(Codes.INVALID_PARAM, channel.json_body["errcode"])
|
|
|
|
|
|
|
|
|
|
# burst_count is a string
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"POST",
|
|
|
|
|
self.url,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
content={"burst_count": "string"},
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2021-04-13 05:26:37 -04:00
|
|
|
|
self.assertEqual(Codes.INVALID_PARAM, channel.json_body["errcode"])
|
|
|
|
|
|
|
|
|
|
# burst_count is negative
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"POST",
|
|
|
|
|
self.url,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
content={"burst_count": -1},
|
|
|
|
|
)
|
|
|
|
|
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2021-04-13 05:26:37 -04:00
|
|
|
|
self.assertEqual(Codes.INVALID_PARAM, channel.json_body["errcode"])
|
|
|
|
|
|
|
|
|
|
def test_return_zero_when_null(self):
|
|
|
|
|
"""
|
|
|
|
|
If values in database are `null` API should return an int `0`
|
|
|
|
|
"""
|
|
|
|
|
|
|
|
|
|
self.get_success(
|
|
|
|
|
self.store.db_pool.simple_upsert(
|
|
|
|
|
table="ratelimit_override",
|
|
|
|
|
keyvalues={"user_id": self.other_user},
|
|
|
|
|
values={
|
|
|
|
|
"messages_per_second": None,
|
|
|
|
|
"burst_count": None,
|
|
|
|
|
},
|
|
|
|
|
)
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
# request status
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
self.url,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-04-13 05:26:37 -04:00
|
|
|
|
self.assertEqual(0, channel.json_body["messages_per_second"])
|
|
|
|
|
self.assertEqual(0, channel.json_body["burst_count"])
|
|
|
|
|
|
|
|
|
|
def test_success(self):
|
|
|
|
|
"""
|
|
|
|
|
Rate-limiting (set/update/delete) should succeed for an admin.
|
|
|
|
|
"""
|
|
|
|
|
# request status
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
self.url,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-04-13 05:26:37 -04:00
|
|
|
|
self.assertNotIn("messages_per_second", channel.json_body)
|
|
|
|
|
self.assertNotIn("burst_count", channel.json_body)
|
|
|
|
|
|
|
|
|
|
# set ratelimit
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"POST",
|
|
|
|
|
self.url,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
content={"messages_per_second": 10, "burst_count": 11},
|
|
|
|
|
)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-04-13 05:26:37 -04:00
|
|
|
|
self.assertEqual(10, channel.json_body["messages_per_second"])
|
|
|
|
|
self.assertEqual(11, channel.json_body["burst_count"])
|
|
|
|
|
|
|
|
|
|
# update ratelimit
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"POST",
|
|
|
|
|
self.url,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
content={"messages_per_second": 20, "burst_count": 21},
|
|
|
|
|
)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-04-13 05:26:37 -04:00
|
|
|
|
self.assertEqual(20, channel.json_body["messages_per_second"])
|
|
|
|
|
self.assertEqual(21, channel.json_body["burst_count"])
|
|
|
|
|
|
|
|
|
|
# request status
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
self.url,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-04-13 05:26:37 -04:00
|
|
|
|
self.assertEqual(20, channel.json_body["messages_per_second"])
|
|
|
|
|
self.assertEqual(21, channel.json_body["burst_count"])
|
|
|
|
|
|
|
|
|
|
# delete ratelimit
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"DELETE",
|
|
|
|
|
self.url,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-04-13 05:26:37 -04:00
|
|
|
|
self.assertNotIn("messages_per_second", channel.json_body)
|
|
|
|
|
self.assertNotIn("burst_count", channel.json_body)
|
|
|
|
|
|
|
|
|
|
# request status
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
self.url,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
2021-11-30 04:53:54 -05:00
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-04-13 05:26:37 -04:00
|
|
|
|
self.assertNotIn("messages_per_second", channel.json_body)
|
|
|
|
|
self.assertNotIn("burst_count", channel.json_body)
|
2022-01-05 06:49:06 -05:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
class AccountDataTestCase(unittest.HomeserverTestCase):
|
|
|
|
|
|
|
|
|
|
servlets = [
|
|
|
|
|
synapse.rest.admin.register_servlets,
|
|
|
|
|
login.register_servlets,
|
|
|
|
|
]
|
|
|
|
|
|
|
|
|
|
def prepare(self, reactor, clock, hs) -> None:
|
|
|
|
|
self.store = hs.get_datastore()
|
|
|
|
|
|
|
|
|
|
self.admin_user = self.register_user("admin", "pass", admin=True)
|
|
|
|
|
self.admin_user_tok = self.login("admin", "pass")
|
|
|
|
|
|
|
|
|
|
self.other_user = self.register_user("user", "pass")
|
|
|
|
|
self.url = f"/_synapse/admin/v1/users/{self.other_user}/accountdata"
|
|
|
|
|
|
|
|
|
|
def test_no_auth(self) -> None:
|
|
|
|
|
"""Try to get information of a user without authentication."""
|
|
|
|
|
channel = self.make_request("GET", self.url, {})
|
|
|
|
|
|
|
|
|
|
self.assertEqual(HTTPStatus.UNAUTHORIZED, channel.code, msg=channel.json_body)
|
|
|
|
|
self.assertEqual(Codes.MISSING_TOKEN, channel.json_body["errcode"])
|
|
|
|
|
|
|
|
|
|
def test_requester_is_no_admin(self) -> None:
|
|
|
|
|
"""If the user is not a server admin, an error is returned."""
|
|
|
|
|
other_user_token = self.login("user", "pass")
|
|
|
|
|
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
self.url,
|
|
|
|
|
access_token=other_user_token,
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
self.assertEqual(HTTPStatus.FORBIDDEN, channel.code, msg=channel.json_body)
|
|
|
|
|
self.assertEqual(Codes.FORBIDDEN, channel.json_body["errcode"])
|
|
|
|
|
|
|
|
|
|
def test_user_does_not_exist(self) -> None:
|
|
|
|
|
"""Tests that a lookup for a user that does not exist returns a 404"""
|
|
|
|
|
url = "/_synapse/admin/v1/users/@unknown_person:test/override_ratelimit"
|
|
|
|
|
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
url,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
self.assertEqual(HTTPStatus.NOT_FOUND, channel.code, msg=channel.json_body)
|
|
|
|
|
self.assertEqual(Codes.NOT_FOUND, channel.json_body["errcode"])
|
|
|
|
|
|
|
|
|
|
def test_user_is_not_local(self) -> None:
|
|
|
|
|
"""Tests that a lookup for a user that is not a local returns a 400"""
|
|
|
|
|
url = "/_synapse/admin/v1/users/@unknown_person:unknown_domain/accountdata"
|
|
|
|
|
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
url,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
|
|
|
|
self.assertEqual("Can only look up local users", channel.json_body["error"])
|
|
|
|
|
|
|
|
|
|
def test_success(self) -> None:
|
|
|
|
|
"""Request account data should succeed for an admin."""
|
|
|
|
|
|
|
|
|
|
# add account data
|
|
|
|
|
self.get_success(
|
|
|
|
|
self.store.add_account_data_for_user(self.other_user, "m.global", {"a": 1})
|
|
|
|
|
)
|
|
|
|
|
self.get_success(
|
|
|
|
|
self.store.add_account_data_to_room(
|
|
|
|
|
self.other_user, "test_room", "m.per_room", {"b": 2}
|
|
|
|
|
)
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
channel = self.make_request(
|
|
|
|
|
"GET",
|
|
|
|
|
self.url,
|
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
|
)
|
|
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
|
|
|
|
self.assertEqual(
|
|
|
|
|
{"a": 1}, channel.json_body["account_data"]["global"]["m.global"]
|
|
|
|
|
)
|
|
|
|
|
self.assertEqual(
|
|
|
|
|
{"b": 2},
|
|
|
|
|
channel.json_body["account_data"]["rooms"]["test_room"]["m.per_room"],
|
|
|
|
|
)
|